Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
D_47267_1687617Q.exe

Overview

General Information

Sample name:D_47267_1687617Q.exe
Analysis ID:1522881
MD5:a31c36986e12203913067e4b5bd81665
SHA1:5db1c9a5cccc75628fde0c2ee4d807b28f2dfc2b
SHA256:c68c8abb1a3272b6c9bdd749b32b91dc909b0e84afd06e067bda1a81a96319b8
Tags:exeuser-Porcupine
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected suspicious sample
Contains functionality to registers a callback to get notified when the system is suspended or resumed (often done by Miners)
Found Tor onion address
Potentially malicious time measurement code found
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
PE file contains sections with non-standard names
Program does not show much activity (idle)

Classification

  • System is w10x64
  • D_47267_1687617Q.exe (PID: 4836 cmdline: "C:\Users\user\Desktop\D_47267_1687617Q.exe" MD5: A31C36986E12203913067E4B5BD81665)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 86.6% probability

Bitcoin Miner

barindex
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004D1CE0 LoadLibraryExW,0_2_004D1CE0
Source: D_47267_1687617Q.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 4x nop then lock or byte ptr [rdx], dil0_2_004BE700
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 4x nop then shr r10, 0Dh0_2_004C9720
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 4x nop then shr r10, 0Dh0_2_004CABC0
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 4x nop then cmp rdx, rbx0_2_004ABE60
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 4x nop then cmp rdx, 40h0_2_004BDFC0

Networking

barindex
Source: D_47267_1687617Q.exe, 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: m=nil base X25519%w%.0wAcceptServernetdnsdomaingophertelnetreturn.local.onionip+netCONIN$rdtscppopcntcmd/gosecretheaderAnswerLengthSTREETavx512rdrandrdseedGlobal\BooleanLayeredRoutingfloat32float64UpgradeTrailersocks5hHEADERSReferer flags= len=%d (conn) %v=%v,expiresrefererrefreshtrailerGODEBUGname %q:method:schemeupgrade:statushttp://chunkedCreatedIM UsedCONNECTreaddirconsolePATHEXTTuesdayJanuaryOctoberMUI_StdMUI_DltabortedCopySidFreeSidSleepExWSARecvWSASendconnectsignal :events19531259765625invaliduintptrChanDir Value>ConvertforcegcallocmWcpuprofallocmRunknowngctraceIO waitrunningsyscallwaitingforevernetworkUNKNOWN, goid= s=nil
Source: D_47267_1687617Q.exeString found in binary or memory: m=nil base X25519%w%.0wAcceptServernetdnsdomaingophertelnetreturn.local.onionip+netCONIN$rdtscppopcntcmd/gosecretheaderAnswerLengthSTREETavx512rdrandrdseedGlobal\BooleanLayeredRoutingfloat32float64UpgradeTrailersocks5hHEADERSReferer flags= len=%d (conn) %v=%v,expiresrefererrefreshtrailerGODEBUGname %q:method:schemeupgrade:statushttp://chunkedCreatedIM UsedCONNECTreaddirconsolePATHEXTTuesdayJanuaryOctoberMUI_StdMUI_DltabortedCopySidFreeSidSleepExWSARecvWSASendconnectsignal :events19531259765625invaliduintptrChanDir Value>ConvertforcegcallocmWcpuprofallocmRunknowngctraceIO waitrunningsyscallwaitingforevernetworkUNKNOWN, goid= s=nil
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004D3260 DuplicateHandle,GetCurrentThreadId,CreateWaitableTimerExW,CreateWaitableTimerExW,NtCreateWaitCompletionPacket,VirtualQuery,0_2_004D3260
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004D1620 NtCancelWaitCompletionPacket,SetWaitableTimer,NtAssociateWaitCompletionPacket,0_2_004D1620
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004D1A20 LoadLibraryExW,LoadLibraryExW,NtCreateWaitCompletionPacket,NtAssociateWaitCompletionPacket,NtCancelWaitCompletionPacket,RtlGetCurrentPeb,RtlGetVersion,0_2_004D1A20
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004D41000_2_004D4100
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004A22600_2_004A2260
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004DE6200_2_004DE620
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004C67600_2_004C6760
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004B38400_2_004B3840
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004E58200_2_004E5820
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004C59400_2_004C5940
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_0050598C0_2_0050598C
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004ACD800_2_004ACD80
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004DEFA00_2_004DEFA0
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004EA0200_2_004EA020
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_0052D0C00_2_0052D0C0
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_005310E00_2_005310E0
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004E01600_2_004E0160
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_0050C2400_2_0050C240
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004C02600_2_004C0260
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_005332C00_2_005332C0
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004DC2800_2_004DC280
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004B83800_2_004B8380
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004FC3A00_2_004FC3A0
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004AA4000_2_004AA400
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004D84200_2_004D8420
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_005354C00_2_005354C0
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_005434C00_2_005434C0
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_005384E00_2_005384E0
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004F94800_2_004F9480
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_0051A5000_2_0051A500
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_005435E00_2_005435E0
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004F05800_2_004F0580
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004C36300_2_004C3630
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004B76C00_2_004B76C0
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004C46A00_2_004C46A0
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004B17600_2_004B1760
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004C97200_2_004C9720
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_0052D7C00_2_0052D7C0
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_005337C00_2_005337C0
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_005437C00_2_005437C0
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004DB8C00_2_004DB8C0
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004F59400_2_004F5940
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004B69600_2_004B6960
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_005009600_2_00500960
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_005319000_2_00531900
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004D09C00_2_004D09C0
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004BE9800_2_004BE980
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_0050EAA00_2_0050EAA0
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004ADB600_2_004ADB60
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_0050FB290_2_0050FB29
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004CABC00_2_004CABC0
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004D7BE00_2_004D7BE0
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_00539BE00_2_00539BE0
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004C9C000_2_004C9C00
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004FBC200_2_004FBC20
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004F1CC00_2_004F1CC0
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_00509D400_2_00509D40
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_00519DE00_2_00519DE0
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_00538DA00_2_00538DA0
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004A3E400_2_004A3E40
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004CCE200_2_004CCE20
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004CDEC00_2_004CDEC0
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004E7EC00_2_004E7EC0
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004FEF000_2_004FEF00
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_0053EF000_2_0053EF00
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004CBF800_2_004CBF80
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004B7FA50_2_004B7FA5
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: String function: 004D9160 appears 586 times
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: String function: 004D8940 appears 59 times
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: String function: 0050A860 appears 539 times
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: String function: 004D63A0 appears 35 times
Source: classification engineClassification label: mal56.evad.mine.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeMutant created: \Sessions\1\BaseNamedObjects\Global\userBjorn
Source: D_47267_1687617Q.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: D_47267_1687617Q.exeString found in binary or memory: concurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:sec
Source: D_47267_1687617Q.exeString found in binary or memory: concurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:sec
Source: D_47267_1687617Q.exeString found in binary or memory: /gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus old
Source: D_47267_1687617Q.exeString found in binary or memory: /gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus old
Source: D_47267_1687617Q.exeString found in binary or memory: /cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.ins
Source: D_47267_1687617Q.exeString found in binary or memory: /cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.ins
Source: D_47267_1687617Q.exeString found in binary or memory: /cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power
Source: D_47267_1687617Q.exeString found in binary or memory: /cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power
Source: D_47267_1687617Q.exeString found in binary or memory: runtime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:sec
Source: D_47267_1687617Q.exeString found in binary or memory: runtime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:sec
Source: D_47267_1687617Q.exeString found in binary or memory: /sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack
Source: D_47267_1687617Q.exeString found in binary or memory: /sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack
Source: D_47267_1687617Q.exeString found in binary or memory: /memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspin
Source: D_47267_1687617Q.exeString found in binary or memory: /memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspin
Source: D_47267_1687617Q.exeString found in binary or memory: /memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent loc
Source: D_47267_1687617Q.exeString found in binary or memory: /memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent loc
Source: D_47267_1687617Q.exeString found in binary or memory: lfstack node allocated from the heap) is larger than maximum page size (runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime:
Source: D_47267_1687617Q.exeString found in binary or memory: lfstack node allocated from the heap) is larger than maximum page size (runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime:
Source: D_47267_1687617Q.exeString found in binary or memory: /memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlineUnable to determine system directoryruntime:
Source: D_47267_1687617Q.exeString found in binary or memory: /memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlineUnable to determine system directoryruntime:
Source: D_47267_1687617Q.exeString found in binary or memory: uncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlineUnable t
Source: D_47267_1687617Q.exeString found in binary or memory: uncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlineUnable t
Source: D_47267_1687617Q.exeString found in binary or memory: runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime:
Source: D_47267_1687617Q.exeString found in binary or memory: runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime:
Source: D_47267_1687617Q.exeString found in binary or memory: ) is larger than maximum page size (runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime:
Source: D_47267_1687617Q.exeString found in binary or memory: ) is larger than maximum page size (runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime:
Source: D_47267_1687617Q.exeString found in binary or memory: /sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlineUnable to determine system directoryruntime: VirtualQuery failed; errno=runtime:
Source: D_47267_1687617Q.exeString found in binary or memory: /sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlineUnable to determine system directoryruntime: VirtualQuery failed; errno=runtime:
Source: D_47267_1687617Q.exeString found in binary or memory: _cgo_pthread_key_created missingruntime: sudog with non-nil elemruntime: sudog with non-nil nextruntime: sudog with non-nil prevruntime: mcall function returnedruntime: newstack called from g=runtime: stack split at bad timepanic while printing panic valueruntime: setevent failed; errno=runtime.semasleep wait_abandonedchacha20poly1305: bad key lengthtls: unknown Renegotiation valuetls: NextProtos values too largego package net: hostLookupOrder(mime: expected token after slashresource temporarily unavailablesoftware caused connection abortnumerical argument out of domainuse of closed network connection" not supported for cpu option "ed25519: bad public key length: x509: unsupported elliptic curvex509: invalid constraint value: x509: malformed subjectPublicKeyx509: cannot parse rfc822Name %qx509: ECDSA verification failurecrypto/aes: input not full blockcrypto/des: input not full blockcrypto/ecdh: invalid private keyunexpected character, want coloninput overflows the modulus sizeinteger is not minimally encodedcannot represent time as UTCTimechacha20: invalid buffer overlapChrome\Application\118.0.5993.120bytes.Buffer.Grow: negative countpseudo header field after regularhttp: invalid Read on closed Bodynet/http: skip alternate protocolinvalid header field value for %qpad size larger than data payloadframe_pushpromise_promiseid_shorthttp2: invalid pseudo headers: %vconnection not allowed by rulesetinvalid username/password versionunsupported transfer encoding: %qrelease of handle with refcount 0sync: RUnlock of unlocked RWMutexCryptAcquireCertificatePrivateKeyGetVolumeNameForVolumeMountPointWInitializeProcThreadAttributeListSetupDiGetDeviceRegistryPropertyWSetupDiSetDeviceRegistryPropertyWskip everything and stop the walkleafCounts[maxBits][maxBits] != n142108547152020037174224853515625710542735760100185871124267578125reflect: slice index out of range of method on nil interface valuereflect: Field index out of rangereflect: array index out of range to pointer to array with length slice bounds out of range [%x:%y]base outside usable address spaceruntime: memory allocated by OS [misrounded allocation in sysAllocconcurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack spanstackalloc not on scheduler stackruntime: goroutine stack exceeds runtime: text offset out of rangetimer period must be non-negativeruntime: name offset out of rangeruntime: type offset out of rangetls: failed to write to key log: tls: invalid server finished hashtls: unexpected ServerKeyExchangego package net: confVal.netCgo = empty hex number for chunk leng
Source: D_47267_1687617Q.exeString found in binary or memory: _cgo_pthread_key_created missingruntime: sudog with non-nil elemruntime: sudog with non-nil nextruntime: sudog with non-nil prevruntime: mcall function returnedruntime: newstack called from g=runtime: stack split at bad timepanic while printing panic valueruntime: setevent failed; errno=runtime.semasleep wait_abandonedchacha20poly1305: bad key lengthtls: unknown Renegotiation valuetls: NextProtos values too largego package net: hostLookupOrder(mime: expected token after slashresource temporarily unavailablesoftware caused connection abortnumerical argument out of domainuse of closed network connection" not supported for cpu option "ed25519: bad public key length: x509: unsupported elliptic curvex509: invalid constraint value: x509: malformed subjectPublicKeyx509: cannot parse rfc822Name %qx509: ECDSA verification failurecrypto/aes: input not full blockcrypto/des: input not full blockcrypto/ecdh: invalid private keyunexpected character, want coloninput overflows the modulus sizeinteger is not minimally encodedcannot represent time as UTCTimechacha20: invalid buffer overlapChrome\Application\118.0.5993.120bytes.Buffer.Grow: negative countpseudo header field after regularhttp: invalid Read on closed Bodynet/http: skip alternate protocolinvalid header field value for %qpad size larger than data payloadframe_pushpromise_promiseid_shorthttp2: invalid pseudo headers: %vconnection not allowed by rulesetinvalid username/password versionunsupported transfer encoding: %qrelease of handle with refcount 0sync: RUnlock of unlocked RWMutexCryptAcquireCertificatePrivateKeyGetVolumeNameForVolumeMountPointWInitializeProcThreadAttributeListSetupDiGetDeviceRegistryPropertyWSetupDiSetDeviceRegistryPropertyWskip everything and stop the walkleafCounts[maxBits][maxBits] != n142108547152020037174224853515625710542735760100185871124267578125reflect: slice index out of range of method on nil interface valuereflect: Field index out of rangereflect: array index out of range to pointer to array with length slice bounds out of range [%x:%y]base outside usable address spaceruntime: memory allocated by OS [misrounded allocation in sysAllocconcurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack spanstackalloc not on scheduler stackruntime: goroutine stack exceeds runtime: text offset out of rangetimer period must be non-negativeruntime: name offset out of rangeruntime: type offset out of rangetls: failed to write to key log: tls: invalid server finished hashtls: unexpected ServerKeyExchangego package net: confVal.netCgo = empty hex number for chunk leng
Source: D_47267_1687617Q.exeString found in binary or memory: failed to construct HKDF label: %stoo many references: cannot spliceunexpected runtime.netpoll error: crypto/rsa: missing public modulusadding nil Certificate to CertPoolx509: unknown public key algorithmx509: invalid certificate policies%s %q is excluded by constraint %qx509: Ed25519 verification failurex509: unhandled critical extensioncrypto/aes: invalid buffer overlapcrypto/des: invalid buffer overlapcrypto/rc4: invalid buffer overlapinvalid padding bits in BIT STRINGGODEBUG sys/cpu: can not disable "chacha20: wrong HChaCha20 key sizehttp: server closed idle connectionCONTINUATION frame with stream ID 02006-01-02T15:04:05.999999999Z07:00executable file not found in %PATH%SubscribeServiceChangeNotificationshash/crc32: invalid hash state sizeflate: corrupt input before offset 1776356839400250464677810668945312588817841970012523233890533447265625ryuFtoaFixed32 called with prec > 9reflect.MakeSlice of non-slice typepersistentalloc: align is too large/memory/classes/heap/released:bytesgreyobject: obj not pointer-alignedmismatched begin/end of activeSweepmheap.freeSpanLocked - invalid freefailed to get or create weak handleattempt to clear non-empty span setruntime: close polldesc w/o unblockruntime: inconsistent read deadlineNtCreateWaitCompletionPacket failedfindrunnable: netpoll with spinningpidleput: P has non-empty run queuetraceback did not unwind completelyruntime: createevent failed; errno=unsupported signature algorithm: %vtls: too many non-advancing recordstls: server selected an invalid PSKtls: invalid Kyber server key sharemime: bogus characters after %%: %qhpack: invalid Huffman-encoded datadynamic table size update too largenetwork dropped connection on resettransport endpoint is not connectedfile type does not support deadlinebigmod: modulus is smaller than natx509: malformed extension OID fieldx509: wrong Ed25519 public key sizex509: invalid authority info accessmlkem768: invalid ciphertext lengthcrypto/md5: invalid hash state sizetoo many Questions to pack (>65535)'_' must separate successive digitsP224 point is the point at infinityP256 point is the point at infinityP384 point is the point at infinityP521 point is the point at infinitysuperfluous leading zeros in lengthchacha20: output smaller than inputtransform: short destination buffernenhum arquivo .exe encontrado em %sbytes.Reader.ReadAt: negative offsethttp: unexpected EOF reading trailer LastStreamID=%v ErrCode=%v Debug=%qRoundTrip retrying after failure: %vno acceptable authentication methodsTime.UnmarshalBinary: invalid lengthstrings.Builder.Grow: negative countstrings: Join output length overflow444089209850062616169452667236328125ryuFtoaFixed64 called with prec > 180123456789abcdefghijklmnopqrstuvwxyzmethod ABI and value ABI don't alignlfstack node allocated from the heap) is larger than maximum page size (runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on
Source: D_47267_1687617Q.exeString found in binary or memory: failed to construct HKDF label: %stoo many references: cannot spliceunexpected runtime.netpoll error: crypto/rsa: missing public modulusadding nil Certificate to CertPoolx509: unknown public key algorithmx509: invalid certificate policies%s %q is excluded by constraint %qx509: Ed25519 verification failurex509: unhandled critical extensioncrypto/aes: invalid buffer overlapcrypto/des: invalid buffer overlapcrypto/rc4: invalid buffer overlapinvalid padding bits in BIT STRINGGODEBUG sys/cpu: can not disable "chacha20: wrong HChaCha20 key sizehttp: server closed idle connectionCONTINUATION frame with stream ID 02006-01-02T15:04:05.999999999Z07:00executable file not found in %PATH%SubscribeServiceChangeNotificationshash/crc32: invalid hash state sizeflate: corrupt input before offset 1776356839400250464677810668945312588817841970012523233890533447265625ryuFtoaFixed32 called with prec > 9reflect.MakeSlice of non-slice typepersistentalloc: align is too large/memory/classes/heap/released:bytesgreyobject: obj not pointer-alignedmismatched begin/end of activeSweepmheap.freeSpanLocked - invalid freefailed to get or create weak handleattempt to clear non-empty span setruntime: close polldesc w/o unblockruntime: inconsistent read deadlineNtCreateWaitCompletionPacket failedfindrunnable: netpoll with spinningpidleput: P has non-empty run queuetraceback did not unwind completelyruntime: createevent failed; errno=unsupported signature algorithm: %vtls: too many non-advancing recordstls: server selected an invalid PSKtls: invalid Kyber server key sharemime: bogus characters after %%: %qhpack: invalid Huffman-encoded datadynamic table size update too largenetwork dropped connection on resettransport endpoint is not connectedfile type does not support deadlinebigmod: modulus is smaller than natx509: malformed extension OID fieldx509: wrong Ed25519 public key sizex509: invalid authority info accessmlkem768: invalid ciphertext lengthcrypto/md5: invalid hash state sizetoo many Questions to pack (>65535)'_' must separate successive digitsP224 point is the point at infinityP256 point is the point at infinityP384 point is the point at infinityP521 point is the point at infinitysuperfluous leading zeros in lengthchacha20: output smaller than inputtransform: short destination buffernenhum arquivo .exe encontrado em %sbytes.Reader.ReadAt: negative offsethttp: unexpected EOF reading trailer LastStreamID=%v ErrCode=%v Debug=%qRoundTrip retrying after failure: %vno acceptable authentication methodsTime.UnmarshalBinary: invalid lengthstrings.Builder.Grow: negative countstrings: Join output length overflow444089209850062616169452667236328125ryuFtoaFixed64 called with prec > 180123456789abcdefghijklmnopqrstuvwxyzmethod ABI and value ABI don't alignlfstack node allocated from the heap) is larger than maximum page size (runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on
Source: D_47267_1687617Q.exeString found in binary or memory: net/addrselect.go
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeSection loaded: umpdc.dllJump to behavior
Source: D_47267_1687617Q.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: D_47267_1687617Q.exeStatic file information: File size 5580288 > 1048576
Source: D_47267_1687617Q.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x26f800
Source: D_47267_1687617Q.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x289e00
Source: D_47267_1687617Q.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: D_47267_1687617Q.exeStatic PE information: section name: .xdata
Source: D_47267_1687617Q.exeStatic PE information: section name: .symtab
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_00512880 rdtscp0_2_00512880
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004D2320 GetSystemInfo,SetProcessPriorityBoost,0_2_004D2320
Source: D_47267_1687617Q.exeBinary or memory string: sched={pc:, gp->status= pluginpath= : unknown pc called from runtime: pid=tlsmaxrsasizeaccess denieduser canceledPKCS1WithSHA1ECDSAWithSHA1CLIENT_RANDOM in host namelame referralgzip, deflateGetTempPath2Wlevel 3 resetsrmount errortimer expiredexchange fullRegDeleteKeyWRegEnumValueWgocacheverifyinstallgoroothtml/templateinvalid ASN.1SHA256-RSAPSSSHA384-RSAPSSSHA512-RSAPSSemail addressshared_secretname too longempty integerunsupported: SustainabilityTransformationAuthenticationInitializationRiskManagementVirtualMachineis a directoryunexpected EOFContent-LengthMAX_FRAME_SIZEPROTOCOL_ERRORINTERNAL_ERRORREFUSED_STREAMERR_UNKNOWN_%daccept-charsetcontent-lengthread_frame_eofinternal errorunknown error unknown code: Not AcceptableComputerNameExasynctimerchan: extra text: ControlServiceCreateServiceWCryptGenRandomIsWellKnownSidMakeAbsoluteSDOpenSCManagerWSetThreadTokenCertCloseStoreClearCommBreakClearCommErrorCreateEventExWCreateMutexExWCreateProcessWFindFirstFileWFormatMessageWGetConsoleModeGetProcAddressGetTickCount64IsWow64ProcessLoadLibraryExWModule32FirstWProcess32NextWSetConsoleModeSetFilePointerSizeofResourceVirtualProtectVirtualQueryExNetUserGetInfoCoInitializeExCoUninitializeGetUserNameExWTranslateNameWGetShellWindowVerQueryValueWgetprotobyname procedure in invalid syntax1907348632812595367431640625unsafe.Pointer on zero Valueunknown methoduserArenaStateGC (dedicated)read mem statsgcstoptheworldprofstackdepthtraceallocfreeGC assist waitfinalizer waitsync.Cond.Waits.allocCount= nil elem type! to finalizer GC worker initruntime: full=runtime: want=MB; allocated RtlGetVersion
Source: D_47267_1687617Q.exeBinary or memory string: sched={pc:, gp->status= pluginpath= : unknown pc called from runtime: pid=tlsmaxrsasizeaccess denieduser canceledPKCS1WithSHA1ECDSAWithSHA1CLIENT_RANDOM in host namelame referralgzip, deflateGetTempPath2Wlevel 3 resetsrmount errortimer expiredexchange fullRegDeleteKeyWRegEnumValueWgocacheverifyinstallgoroothtml/templateinvalid ASN.1SHA256-RSAPSSSHA384-RSAPSSSHA512-RSAPSSemail addressshared_secretname too longempty integerunsupported: SustainabilityTransformationAuthenticationInitializationRiskManagementVirtualMachineis a directoryunexpected EOFContent-LengthMAX_FRAME_SIZEPROTOCOL_ERRORINTERNAL_ERRORREFUSED_STREAMERR_UNKNOWN_%daccept-charsetcontent-lengthread_frame_eofinternal errorunknown error unknown code: Not AcceptableComputerNameExasynctimerchan: extra text: ControlServiceCreateServiceWCryptGenRandomIsWellKnownSidMakeAbsoluteSDOpenSCManagerWSetThreadTokenCertCloseStoreClearCommBreakClearCommErrorCreateEventExWCreateMutexExWCreateProcessWFindFirstFileWFormatMessageWGetConsoleModeGetProcAddressGetTickCount64IsWow64ProcessLoadLibraryExWModule32FirstWProcess32NextWSetConsoleModeSetFilePointerSizeofResourceVirtualProtectVirtualQueryExNetUserGetInfoCoInitializeExCoUninitializeGetUserNameExWTranslateNameWGetShellWindowVerQueryValueWgetprotobyname procedure in invalid syntax1907348632812595367431640625unsafe.Pointer on zero Valueunknown methoduserArenaStateGC (dedicated)read mem statsgcstoptheworldprofstackdepthtraceallocfreeGC assist waitfinalizer waitsync.Cond.Waits.allocCount= nil elem type! to finalizer GC worker initruntime: full=runtime: want=MB; allocated RtlGetVersiontimeEndPeriodbad restart PC-thread limit
Source: D_47267_1687617Q.exe, 00000000.00000002.3255090691.000001FB58B3C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll

Anti Debugging

barindex
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_00512880 Start: 00512889 End: 0051289F0_2_00512880
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_00512880 rdtscp0_2_00512880
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\D_47267_1687617Q.exeCode function: 0_2_004D1A20 LoadLibraryExW,LoadLibraryExW,NtCreateWaitCompletionPacket,NtAssociateWaitCompletionPacket,NtCancelWaitCompletionPacket,RtlGetCurrentPeb,RtlGetVersion,0_2_004D1A20
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
OS Credential Dumping11
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
DLL Side-Loading
LSASS Memory3
System Information Discovery
Remote Desktop ProtocolData from Removable Media1
Proxy
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
Obfuscated Files or Information
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1522881
Start date and time:2024-09-30 19:52:05 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 36s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:5
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:D_47267_1687617Q.exe
Detection:MAL
Classification:mal56.evad.mine.winEXE@1/0@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 98%
  • Number of executed functions: 16
  • Number of non-executed functions: 58
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • VT rate limit hit for: D_47267_1687617Q.exe
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):6.227541951702708
TrID:
  • Win64 Executable GUI (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:D_47267_1687617Q.exe
File size:5'580'288 bytes
MD5:a31c36986e12203913067e4b5bd81665
SHA1:5db1c9a5cccc75628fde0c2ee4d807b28f2dfc2b
SHA256:c68c8abb1a3272b6c9bdd749b32b91dc909b0e84afd06e067bda1a81a96319b8
SHA512:fdf3f466bfbd42103c118913c14a93fc3aa6b02427c4728a9a19a10c201df97c964a0bfac1b2e3a8af599acb1b7ade8a3340956e7be988596fb1fa0172eec5f1
SSDEEP:49152:vv6SNBVqlEhYQB+MXtrKyNsYthDD6A9Fzvv/0uja5E3TdqyeN7rdNC8dMzw2pk:n57qyJIRpA9FzaEYTNPG8dMzw
TLSH:AC464A07ECE545A8D0AED235CA629152BB727C485B3423D72FA0F7392F76BD06A79700
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........$U.......".......&......... @........@..............................`Z...........`... ............................
Icon Hash:00928e8e8686b000
Entrypoint:0x474020
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:1
File Version Major:6
File Version Minor:1
Subsystem Version Major:6
Subsystem Version Minor:1
Import Hash:d42595b695fc008ef2c56aabd8efd68e
Instruction
jmp 00007F47B4B9F230h
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
push ebp
dec eax
mov ebp, esp
pushfd
cld
dec eax
sub esp, 000000E0h
dec eax
mov dword ptr [esp], edi
dec eax
mov dword ptr [esp+08h], esi
dec eax
mov dword ptr [esp+10h], ebp
dec eax
mov dword ptr [esp+18h], ebx
dec esp
mov dword ptr [esp+20h], esp
dec esp
mov dword ptr [esp+28h], ebp
dec esp
mov dword ptr [esp+30h], esi
dec esp
mov dword ptr [esp+38h], edi
movups dqword ptr [esp+40h], xmm6
movups dqword ptr [esp+50h], xmm7
inc esp
movups dqword ptr [esp+60h], xmm0
inc esp
movups dqword ptr [esp+70h], xmm1
inc esp
movups dqword ptr [esp+00000080h], xmm2
inc esp
movups dqword ptr [esp+00000090h], xmm3
inc esp
movups dqword ptr [esp+000000A0h], xmm4
inc esp
movups dqword ptr [esp+000000B0h], xmm5
inc esp
movups dqword ptr [esp+000000C0h], xmm6
inc esp
movups dqword ptr [esp+000000D0h], xmm7
inc ebp
xorps xmm7, xmm7
dec ebp
xor esi, esi
dec eax
mov eax, dword ptr [0050BF02h]
dec eax
mov eax, dword ptr [eax]
dec eax
cmp eax, 00000000h
je 00007F47B4BA2B35h
dec esp
mov esi, dword ptr [eax]
dec eax
sub esp, 10h
dec eax
mov eax, ecx
dec eax
mov ebx, edx
call 00007F47B4BAB28Bh
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x5970000x53e.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x5870000xe574.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x5980000xc060.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x4fb1600x178.data
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x26f6bd0x26f800a29212eab2bcff88ebf75811d25118ebunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x2710000x289c700x289e0011916972bff4790094a961d2ccfb1924unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x4fb0000x8b3c00x3d800025198ce1ed03275e2d16ca0740de71cFalse0.36608787474593496data4.708294853472918IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x5870000xe5740xe6006d3dda79e0681607e92302de8594ccf5False0.40458559782608694data5.434397286713313IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.xdata0x5960000xb40x200e12db9011452e073ab5a219e11a01927False0.224609375shared library1.7635806726373504IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.idata0x5970000x53e0x600e2af31d6918e8cd9ec6b8b7f4f05e961False0.375OpenPGP Public Key3.946664231035693IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.reloc0x5980000xc0600xc200c11fe11bd9b213fa6e7a09b381ca1f93False0.25106717139175255data5.419919190426678IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
.symtab0x5a50000x40x20007b5472d347d42780469fb2654b7fc54False0.02734375data0.020393135236084953IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
DLLImport
kernel32.dllWriteFile, WriteConsoleW, WerSetFlags, WerGetFlags, WaitForMultipleObjects, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, TlsAlloc, SwitchToThread, SuspendThread, SetWaitableTimer, SetProcessPriorityBoost, SetEvent, SetErrorMode, SetConsoleCtrlHandler, RtlVirtualUnwind, RtlLookupFunctionEntry, ResumeThread, RaiseFailFastException, PostQueuedCompletionStatus, LoadLibraryW, LoadLibraryExW, SetThreadContext, GetThreadContext, GetSystemInfo, GetSystemDirectoryA, GetStdHandle, GetQueuedCompletionStatusEx, GetProcessAffinityMask, GetProcAddress, GetErrorMode, GetEnvironmentStringsW, GetCurrentThreadId, GetConsoleMode, FreeEnvironmentStringsW, ExitProcess, DuplicateHandle, CreateWaitableTimerExW, CreateThread, CreateIoCompletionPort, CreateEventA, CloseHandle, AddVectoredExceptionHandler, AddVectoredContinueHandler
TimestampSource PortDest PortSource IPDest IP
Sep 30, 2024 19:53:14.483786106 CEST53505551.1.1.1192.168.2.5
Sep 30, 2024 19:53:16.968255997 CEST53638981.1.1.1192.168.2.5

Click to jump to process

Click to jump to process

Target ID:0
Start time:13:52:52
Start date:30/09/2024
Path:C:\Users\user\Desktop\D_47267_1687617Q.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\D_47267_1687617Q.exe"
Imagebase:0x4a0000
File size:5'580'288 bytes
MD5 hash:A31C36986E12203913067E4B5BD81665
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Reset < >

    Execution Graph

    Execution Coverage:0.9%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:24.6%
    Total number of Nodes:954
    Total number of Limit Nodes:75
    execution_graph 61224 4c8a0d 61225 4c8760 61224->61225 61232 4ac0e0 61225->61232 61227 4c8805 61244 4c8b20 61227->61244 61231 4c8996 61233 4ac0ea 61232->61233 61233->61232 61234 4ac108 61233->61234 61261 50a860 CreateMutexExW 61233->61261 61236 4ac18d 61234->61236 61253 4d2f80 CreateMutexExW 61234->61253 61236->61227 61238 4ac139 61254 4cdc60 CreateMutexExW 61238->61254 61240 4ac236 61240->61227 61241 4ac165 61241->61240 61255 5109c0 61241->61255 61260 4d2c40 CreateMutexExW 61241->61260 61248 4c8b2a 61244->61248 61245 4c8885 61252 4ac340 CreateMutexExW 61245->61252 61247 4b41e0 CreateMutexExW 61247->61248 61248->61244 61248->61245 61248->61247 61249 4c8b85 61248->61249 61534 4ac340 CreateMutexExW 61248->61534 61535 50a860 CreateMutexExW 61248->61535 61250 4ac0e0 CreateMutexExW 61249->61250 61250->61245 61252->61231 61253->61238 61254->61241 61256 5109e1 61255->61256 61257 510a09 61255->61257 61256->61257 61262 4c6340 61256->61262 61268 4e30e0 61256->61268 61257->61241 61260->61241 61261->61233 61264 4c6346 61262->61264 61263 4c6386 61274 4c6760 61263->61274 61264->61262 61264->61263 61310 4c5ae0 CreateMutexExW 61264->61310 61267 4c639c 61267->61257 61270 4e30e6 61268->61270 61270->61268 61532 4e3160 CreateMutexExW 61270->61532 61271 4e3105 61533 4e7140 CreateMutexExW 61271->61533 61273 4e3125 61273->61257 61284 4c676f 61274->61284 61275 4ac0e0 CreateMutexExW 61275->61284 61276 4c68bd 61279 4c697e 61276->61279 61347 4c6660 61276->61347 61277 4ca900 CreateMutexExW 61277->61284 61373 4ac340 CreateMutexExW 61279->61373 61284->61274 61284->61275 61284->61276 61284->61277 61285 4c6914 61284->61285 61291 4c6870 61284->61291 61311 4c7080 61284->61311 61370 4cbf80 CreateMutexExW 61284->61370 61371 4ac340 CreateMutexExW 61284->61371 61398 50a860 CreateMutexExW 61284->61398 61372 4ac340 CreateMutexExW 61285->61372 61287 4c6925 61287->61267 61290 4c6ba5 61299 4c6bf8 61290->61299 61360 4b44a0 61290->61360 61303 4c6b56 61291->61303 61374 4c0c00 CreateMutexExW 61291->61374 61293 4cfe00 CreateMutexExW 61297 4c6c14 61293->61297 61298 4c6c35 61297->61298 61300 4cfe00 CreateMutexExW 61297->61300 61395 4cfec0 CreateMutexExW 61298->61395 61299->61293 61300->61298 61302 4c6b07 61302->61303 61375 4bada0 CreateMutexExW 61302->61375 61355 4c6da0 61303->61355 61305 4c6c45 61396 4cffa0 CreateMutexExW 61305->61396 61307 4c6ce8 61307->61267 61308 4c6cb4 61308->61307 61397 4f70e0 CreateMutexExW 61308->61397 61310->61263 61312 4c708a 61311->61312 61312->61311 61321 4c7116 61312->61321 61399 4acd80 61312->61399 61315 4cfe00 CreateMutexExW 61318 4c72c9 61315->61318 61316 4c71fc 61426 4d88e0 CreateMutexExW 61316->61426 61433 4cfec0 CreateMutexExW 61318->61433 61319 4c7225 61427 4d9160 CreateMutexExW 61319->61427 61321->61315 61322 4c70ff 61322->61321 61325 4cfe00 CreateMutexExW 61322->61325 61324 4c72d5 61434 4cffa0 CreateMutexExW 61324->61434 61328 4c7166 61325->61328 61326 4c7236 61428 4d8ea0 CreateMutexExW 61326->61428 61424 4cfec0 CreateMutexExW 61328->61424 61330 4c72ec 61415 4c8da0 61330->61415 61332 4c7172 61425 4cffa0 CreateMutexExW 61332->61425 61333 4c7245 61429 4d9160 CreateMutexExW 61333->61429 61337 4c7305 61337->61284 61338 4c7189 61341 4c8da0 CreateMutexExW 61338->61341 61339 4c7256 61430 4d8ea0 CreateMutexExW 61339->61430 61341->61321 61342 4c7268 61431 4d9160 CreateMutexExW 61342->61431 61344 4c7279 61432 4d8940 CreateMutexExW 61344->61432 61346 4c727e 61346->61284 61348 4c666a 61347->61348 61348->61347 61349 4c669d 61348->61349 61353 4c6685 61348->61353 61495 4b71a0 61349->61495 61351 4c66c9 61351->61279 61352 4c66a8 61352->61279 61353->61351 61354 4b71a0 CreateMutexExW 61353->61354 61354->61353 61357 4c6daa 61355->61357 61357->61355 61358 4c6fab 61357->61358 61359 4d4fe0 CreateMutexExW 61357->61359 61523 4c6500 CreateMutexExW 61357->61523 61358->61290 61359->61357 61361 4b44aa 61360->61361 61361->61360 61362 4b4513 61361->61362 61363 4d3c60 CreateMutexExW 61361->61363 61364 4d88e0 CreateMutexExW 61361->61364 61365 4d9160 CreateMutexExW 61361->61365 61366 4d8ea0 CreateMutexExW 61361->61366 61367 4d8b20 CreateMutexExW 61361->61367 61368 4d8940 CreateMutexExW 61361->61368 61369 50a860 CreateMutexExW 61361->61369 61376 4cfe00 61362->61376 61363->61361 61364->61361 61365->61361 61366->61361 61367->61361 61368->61361 61369->61361 61370->61284 61371->61284 61372->61287 61373->61291 61374->61302 61375->61303 61377 4cfe25 61376->61377 61378 4cfe38 61377->61378 61524 4d88e0 CreateMutexExW 61377->61524 61378->61299 61380 4cfe45 61525 4d9160 CreateMutexExW 61380->61525 61382 4cfe56 61526 4d8ea0 CreateMutexExW 61382->61526 61384 4cfe65 61527 4d9160 CreateMutexExW 61384->61527 61386 4cfe76 61528 4d8f80 CreateMutexExW 61386->61528 61388 4cfe85 61529 4d8b20 CreateMutexExW 61388->61529 61390 4cfe8a 61530 4d8940 CreateMutexExW 61390->61530 61392 4cfe8f 61531 50a860 CreateMutexExW 61392->61531 61394 4cfea5 61395->61305 61396->61308 61397->61307 61398->61284 61414 4acd8f 61399->61414 61403 4b71a0 CreateMutexExW 61403->61414 61406 4ae020 CreateMutexExW 61406->61414 61407 50a860 CreateMutexExW 61407->61414 61408 4d8fe0 CreateMutexExW 61408->61414 61409 4adc80 CreateMutexExW 61409->61414 61410 4d9160 CreateMutexExW 61410->61414 61411 4ad0d9 61411->61316 61411->61322 61414->61399 61414->61403 61414->61406 61414->61407 61414->61408 61414->61409 61414->61410 61414->61411 61435 4d3c60 61414->61435 61438 4b47e0 61414->61438 61445 4b4700 CreateMutexExW 61414->61445 61446 4ad540 CreateMutexExW 61414->61446 61447 4d88e0 CreateMutexExW 61414->61447 61448 4d8b20 CreateMutexExW 61414->61448 61449 4d8940 CreateMutexExW 61414->61449 61423 4c8daa 61415->61423 61420 4c8fcc 61420->61337 61423->61415 61423->61420 61465 4cb220 61423->61465 61480 4b41e0 61423->61480 61485 4c1940 CreateMutexExW 61423->61485 61486 4cee80 CreateMutexExW 61423->61486 61487 4cf260 CreateMutexExW 61423->61487 61488 50a860 CreateMutexExW 61423->61488 61424->61332 61425->61338 61426->61319 61427->61326 61428->61333 61429->61339 61430->61342 61431->61344 61432->61346 61433->61324 61434->61330 61450 4d3a00 61435->61450 61439 4b47ea 61438->61439 61439->61438 61440 4d3c60 CreateMutexExW 61439->61440 61441 4b4825 61440->61441 61442 4b4845 61441->61442 61443 4d3c60 CreateMutexExW 61441->61443 61442->61414 61444 4b4885 61443->61444 61444->61414 61445->61414 61446->61414 61447->61414 61448->61414 61449->61414 61451 4d3a1c 61450->61451 61454 5125c0 61451->61454 61453 4d3a7b 61453->61414 61455 5125e5 61454->61455 61456 512647 61454->61456 61455->61456 61458 5125fa 61455->61458 61457 5125a0 CreateMutexExW 61456->61457 61459 512661 61457->61459 61462 5125a0 61458->61462 61459->61453 61464 514180 CreateMutexExW 61462->61464 61463 5125ad 61463->61453 61464->61463 61476 4cb22f 61465->61476 61467 4d9160 CreateMutexExW 61467->61476 61468 4cb587 61490 4cb7a0 CreateMutexExW 61468->61490 61471 4cb5b5 61471->61423 61472 4d8fe0 CreateMutexExW 61472->61476 61476->61465 61476->61467 61476->61468 61476->61472 61477 4cef00 CreateMutexExW 61476->61477 61478 4cfe00 CreateMutexExW 61476->61478 61479 4b44a0 CreateMutexExW 61476->61479 61489 4cee80 CreateMutexExW 61476->61489 61491 4d88e0 CreateMutexExW 61476->61491 61492 4d8b20 CreateMutexExW 61476->61492 61493 4d8940 CreateMutexExW 61476->61493 61494 50a860 CreateMutexExW 61476->61494 61477->61476 61478->61476 61479->61476 61481 4cfe00 CreateMutexExW 61480->61481 61482 4b41fb 61481->61482 61483 4d3c60 CreateMutexExW 61482->61483 61484 4b4245 61483->61484 61484->61423 61485->61423 61486->61423 61487->61423 61488->61423 61489->61476 61490->61471 61491->61476 61492->61476 61493->61476 61494->61476 61496 4b71aa 61495->61496 61496->61495 61499 4b71be 61496->61499 61517 4d88e0 CreateMutexExW 61496->61517 61518 4d9160 CreateMutexExW 61496->61518 61519 4d8940 CreateMutexExW 61496->61519 61520 50a860 CreateMutexExW 61496->61520 61498 4b7217 61500 4b7247 61498->61500 61511 4c56e0 61498->61511 61499->61498 61502 4b71c7 61499->61502 61507 4adc80 61499->61507 61500->61352 61502->61352 61508 4adc86 61507->61508 61508->61507 61509 5109c0 CreateMutexExW 61508->61509 61510 4adcca 61509->61510 61510->61498 61515 4c56ea 61511->61515 61512 4b41e0 CreateMutexExW 61512->61515 61513 4c583c 61513->61500 61515->61511 61515->61512 61515->61513 61521 4b4280 CreateMutexExW 61515->61521 61522 50a860 CreateMutexExW 61515->61522 61517->61496 61518->61496 61519->61496 61520->61496 61521->61515 61522->61515 61523->61357 61524->61380 61525->61382 61526->61384 61527->61386 61528->61388 61529->61390 61530->61392 61531->61394 61532->61271 61533->61273 61534->61248 61535->61248 61536 4b3ccd 61537 4b3ce0 61536->61537 61538 4b3d0c 61537->61538 61539 4b3cf2 61537->61539 61543 4cf880 61538->61543 61540 4cf880 CreateMutexExW 61539->61540 61542 4b3d0a 61540->61542 61544 4cf88a 61543->61544 61544->61543 61556 4cfd40 CreateMutexExW 61544->61556 61546 4cf8aa 61547 4ac0e0 CreateMutexExW 61546->61547 61548 4cf90b 61546->61548 61555 4cf9c9 61546->61555 61557 4ac340 CreateMutexExW 61546->61557 61547->61546 61550 4adc80 CreateMutexExW 61548->61550 61553 4cf94d 61548->61553 61550->61553 61552 4cf99b 61559 4ac340 CreateMutexExW 61552->61559 61558 4cfca0 CreateMutexExW 61553->61558 61555->61542 61556->61546 61557->61546 61558->61552 61559->61555 61560 4add20 61561 4add26 61560->61561 61561->61560 61564 4add60 61561->61564 61563 4add48 61569 4add6a 61564->61569 61565 50a860 CreateMutexExW 61565->61569 61566 4adda5 61567 4ade7b 61566->61567 61568 4addb6 61566->61568 61570 4b41e0 CreateMutexExW 61567->61570 61571 4addea 61568->61571 61572 4ac0e0 CreateMutexExW 61568->61572 61569->61564 61569->61565 61569->61566 61573 4ade85 61570->61573 61574 4b41e0 CreateMutexExW 61571->61574 61578 4ade76 61571->61578 61572->61571 61573->61563 61575 4ade65 61574->61575 61577 4adf90 61575->61577 61575->61578 61576 4adee9 61580 4adf25 61576->61580 61583 4cfe00 CreateMutexExW 61576->61583 61587 50a860 CreateMutexExW 61577->61587 61588 4ac340 CreateMutexExW 61577->61588 61578->61576 61586 4ac340 CreateMutexExW 61578->61586 61580->61563 61584 4adf10 61583->61584 61585 4cfe00 CreateMutexExW 61584->61585 61585->61580 61586->61576 61587->61577 61588->61577 61589 4dca40 61590 4dca53 61589->61590 61595 4dcac0 61590->61595 61594 4dcab4 61597 4dcaca 61595->61597 61596 4dcae9 61608 4d3260 61596->61608 61597->61595 61597->61596 61654 50a860 CreateMutexExW 61597->61654 61600 4dcb25 61601 4dcb3c 61600->61601 61653 4dcbc0 CreateMutexExW 61600->61653 61603 4dcb5d 61601->61603 61624 4e5820 61601->61624 61640 4e0d20 61603->61640 61607 4dcc00 CreateMutexExW 61607->61594 61621 4d326f 61608->61621 61610 4ac0e0 CreateMutexExW 61610->61621 61611 4d88e0 CreateMutexExW 61611->61621 61612 4d3a00 CreateMutexExW 61612->61621 61614 4d3c60 CreateMutexExW 61614->61621 61615 4d3be0 CreateMutexExW 61615->61621 61616 50a860 CreateMutexExW 61616->61621 61617 4d351d 61617->61600 61618 4d9160 CreateMutexExW 61618->61621 61619 4d8ea0 CreateMutexExW 61619->61621 61620 4d8fe0 CreateMutexExW 61620->61621 61621->61608 61621->61610 61621->61611 61621->61612 61621->61614 61621->61615 61621->61616 61621->61617 61621->61618 61621->61619 61621->61620 61622 4d8b20 CreateMutexExW 61621->61622 61623 4d8940 CreateMutexExW 61621->61623 61655 4d3de0 61621->61655 61658 4ac340 CreateMutexExW 61621->61658 61622->61621 61623->61621 61627 4e582a 61624->61627 61626 5109c0 CreateMutexExW 61626->61627 61627->61624 61627->61626 61629 5125c0 CreateMutexExW 61627->61629 61632 4ac340 CreateMutexExW 61627->61632 61636 4d1f20 CreateMutexExW 61627->61636 61637 4ac0e0 CreateMutexExW 61627->61637 61638 4e5380 CreateMutexExW 61627->61638 61659 4e5da0 61627->61659 61672 4e53e0 CreateMutexExW 61627->61672 61673 4f5ea0 CreateMutexExW 61627->61673 61674 4ac880 CreateMutexExW 61627->61674 61675 4d1200 61627->61675 61689 4c0660 CreateMutexExW 61627->61689 61690 4b75c0 CreateMutexExW 61627->61690 61691 4e61a0 CreateMutexExW 61627->61691 61629->61627 61632->61627 61636->61627 61637->61627 61638->61627 61651 4e0d2a 61640->61651 61643 50a860 CreateMutexExW 61643->61651 61646 4ac0e0 CreateMutexExW 61646->61651 61647 4e0f57 61648 4dede0 CreateMutexExW 61647->61648 61650 4dcaaa 61648->61650 61650->61607 61651->61640 61651->61643 61651->61646 61651->61647 61652 4ac340 CreateMutexExW 61651->61652 61810 4de9a0 61651->61810 61824 4defa0 61651->61824 61882 4e0960 61651->61882 61886 4dede0 61651->61886 61896 4dec20 CreateMutexExW 61651->61896 61652->61651 61653->61601 61654->61597 61656 4d3a00 CreateMutexExW 61655->61656 61657 4d3e36 61656->61657 61657->61621 61658->61621 61660 4e5daa 61659->61660 61660->61659 61661 4ac0e0 CreateMutexExW 61660->61661 61670 4e5dc5 61661->61670 61662 4e5ea7 61696 4ac340 CreateMutexExW 61662->61696 61664 4e5eb5 61664->61627 61667 4e5380 CreateMutexExW 61667->61670 61670->61662 61670->61667 61671 4ac0e0 CreateMutexExW 61670->61671 61692 4e6100 61670->61692 61697 4ac340 CreateMutexExW 61670->61697 61698 4fe3e0 CreateMutexExW 61670->61698 61699 4de620 61670->61699 61671->61670 61672->61627 61673->61627 61674->61627 61686 4d1212 61675->61686 61679 4d129b 61679->61627 61680 4d88e0 CreateMutexExW 61680->61686 61682 4d9160 CreateMutexExW 61682->61686 61683 4d8ea0 CreateMutexExW 61683->61686 61685 4d8b20 CreateMutexExW 61685->61686 61686->61675 61686->61679 61686->61680 61686->61682 61686->61683 61686->61685 61687 50a860 CreateMutexExW 61686->61687 61688 4d8940 CreateMutexExW 61686->61688 61789 4d1620 61686->61789 61802 4d3d60 61686->61802 61805 4d10e0 CreateMutexExW 61686->61805 61806 4d8f80 CreateMutexExW 61686->61806 61807 4d4fe0 CreateMutexExW 61686->61807 61687->61686 61688->61686 61689->61627 61690->61627 61691->61627 61693 4e6106 61692->61693 61693->61692 61694 4e6155 61693->61694 61726 4d4100 61693->61726 61694->61670 61696->61664 61697->61670 61698->61670 61700 4de62a 61699->61700 61700->61699 61701 4ac0e0 CreateMutexExW 61700->61701 61703 4de6db 61700->61703 61702 4de7c5 61701->61702 61705 4de7d3 61702->61705 61707 4de90d 61702->61707 61703->61670 61704 4de834 61709 4de8eb 61704->61709 61710 4de846 61704->61710 61705->61704 61781 4ac440 CreateMutexExW 61705->61781 61706 4de965 61788 4ac340 CreateMutexExW 61706->61788 61707->61706 61787 4ac440 CreateMutexExW 61707->61787 61786 4ac340 CreateMutexExW 61709->61786 61713 4de88b 61710->61713 61715 4de865 61710->61715 61712 4de973 61712->61670 61783 4e6d60 CreateMutexExW 61713->61783 61782 4ac340 CreateMutexExW 61715->61782 61716 4de8f9 61716->61670 61720 4de873 61720->61670 61721 4de8c5 61784 4ac340 CreateMutexExW 61721->61784 61723 4de8d3 61724 4de8e5 61723->61724 61785 4e0900 CreateMutexExW 61723->61785 61724->61670 61741 4d4112 61726->61741 61727 4d4525 61727->61694 61728 4ac0e0 CreateMutexExW 61728->61741 61729 4d4177 61768 4ac340 CreateMutexExW 61729->61768 61731 4d3de0 CreateMutexExW 61731->61741 61732 4d4186 61732->61694 61733 4d4226 61769 4ac340 CreateMutexExW 61733->61769 61735 4d4235 61736 4ac0e0 CreateMutexExW 61735->61736 61738 4d4270 61736->61738 61765 4d3ae0 61738->61765 61741->61726 61741->61727 61741->61728 61741->61729 61741->61731 61741->61733 61755 50a860 CreateMutexExW 61741->61755 61776 4d88e0 CreateMutexExW 61741->61776 61777 4d9160 CreateMutexExW 61741->61777 61778 4d8ea0 CreateMutexExW 61741->61778 61779 4d8b20 CreateMutexExW 61741->61779 61780 4d8940 CreateMutexExW 61741->61780 61743 4d42ad 61770 4d3b60 61743->61770 61744 4d44c1 61775 4ac340 CreateMutexExW 61744->61775 61750 4d44cf 61752 4d3ae0 CreateMutexExW 61750->61752 61754 4d44ec 61752->61754 61754->61694 61755->61741 61756 4d42f7 61757 4d4425 61756->61757 61774 4d8420 CreateMutexExW 61756->61774 61758 4d3ae0 CreateMutexExW 61757->61758 61760 4d4472 61758->61760 61762 4d3ae0 CreateMutexExW 61760->61762 61761 4d43cd 61761->61757 61764 4d3b60 CreateMutexExW 61761->61764 61763 4d44a5 61762->61763 61763->61694 61764->61757 61766 4d3a00 CreateMutexExW 61765->61766 61767 4d3b36 61766->61767 61767->61743 61767->61744 61768->61732 61769->61735 61771 4d3a00 CreateMutexExW 61770->61771 61772 4d3bb6 61771->61772 61773 4ac340 CreateMutexExW 61772->61773 61773->61756 61774->61761 61775->61750 61776->61741 61777->61741 61778->61741 61779->61741 61780->61741 61781->61704 61782->61720 61783->61721 61784->61723 61785->61724 61786->61716 61787->61706 61788->61712 61798 4d162f 61789->61798 61790 4d3b60 CreateMutexExW 61790->61798 61791 4d17b1 61791->61686 61792 4d3d60 CreateMutexExW 61792->61798 61793 4d88e0 CreateMutexExW 61793->61798 61796 4d8ea0 CreateMutexExW 61796->61798 61797 4d9160 CreateMutexExW 61797->61798 61798->61789 61798->61790 61798->61791 61798->61792 61798->61793 61798->61796 61798->61797 61799 4d8b20 CreateMutexExW 61798->61799 61800 50a860 CreateMutexExW 61798->61800 61801 4d8940 CreateMutexExW 61798->61801 61808 4d0ee0 CreateMutexExW 61798->61808 61809 4d3e60 CreateMutexExW 61798->61809 61799->61798 61800->61798 61801->61798 61803 4d3a00 CreateMutexExW 61802->61803 61804 4d3db6 61803->61804 61804->61686 61805->61686 61806->61686 61808->61798 61809->61798 61819 4de9aa 61810->61819 61814 4de620 CreateMutexExW 61814->61819 61815 4dea4a 61815->61651 61816 4d8940 CreateMutexExW 61816->61819 61817 4d88e0 CreateMutexExW 61817->61819 61818 4d90e0 CreateMutexExW 61818->61819 61819->61810 61819->61814 61819->61815 61819->61816 61819->61817 61819->61818 61820 4d8ea0 CreateMutexExW 61819->61820 61821 4d8b20 CreateMutexExW 61819->61821 61822 4d9160 CreateMutexExW 61819->61822 61823 50a860 CreateMutexExW 61819->61823 61897 4e51a0 61819->61897 61903 4e5380 CreateMutexExW 61819->61903 61904 4ac4c0 CreateMutexExW 61819->61904 61820->61819 61821->61819 61822->61819 61823->61819 61837 4defb2 61824->61837 61829 4df995 61919 4db8c0 CreateMutexExW 61829->61919 61831 5125c0 CreateMutexExW 61831->61837 61833 4df9d8 61834 4df9fc 61833->61834 61920 4fdfc0 CreateMutexExW 61833->61920 61834->61651 61836 4e6c20 CreateMutexExW 61836->61837 61837->61824 61837->61829 61837->61831 61837->61836 61838 4df978 61837->61838 61841 4dfa99 61837->61841 61844 4dff6e 61837->61844 61845 4dfe94 61837->61845 61855 4ac340 CreateMutexExW 61837->61855 61856 4e51a0 CreateMutexExW 61837->61856 61860 50a860 CreateMutexExW 61837->61860 61864 4d1200 CreateMutexExW 61837->61864 61865 4dfe2e 61837->61865 61869 4ac0e0 CreateMutexExW 61837->61869 61870 4dfd09 61837->61870 61871 4de200 CreateMutexExW 61837->61871 61877 4dfba6 61837->61877 61907 4dd2a0 CreateMutexExW 61837->61907 61908 4f5940 CreateMutexExW 61837->61908 61909 4bf3e0 CreateMutexExW 61837->61909 61910 4dac40 CreateMutexExW 61837->61910 61911 4decc0 CreateMutexExW 61837->61911 61912 4e0160 CreateMutexExW 61837->61912 61913 4bfec0 CreateMutexExW 61837->61913 61914 4e6d60 CreateMutexExW 61837->61914 61915 4e70e0 CreateMutexExW 61837->61915 61916 4e0560 CreateMutexExW 61837->61916 61917 4e0740 CreateMutexExW 61837->61917 61918 4e6f40 CreateMutexExW 61837->61918 61925 4d10e0 CreateMutexExW 61837->61925 61931 4bffa0 CreateMutexExW 61837->61931 61838->61651 61921 4db8c0 CreateMutexExW 61841->61921 61932 4db8c0 CreateMutexExW 61844->61932 61929 4e6c20 CreateMutexExW 61845->61929 61846 4dfb15 61847 4dfb36 61846->61847 61922 4fdfc0 CreateMutexExW 61846->61922 61847->61651 61849 4dfe9b 61930 4ac340 CreateMutexExW 61849->61930 61853 4dffc5 61857 4dffe6 61853->61857 61933 4fdfc0 CreateMutexExW 61853->61933 61854 4dfeb1 61854->61651 61855->61837 61856->61837 61857->61651 61860->61837 61864->61837 61928 4ac340 CreateMutexExW 61865->61928 61868 4dfe45 61868->61651 61869->61837 61926 4db8c0 CreateMutexExW 61870->61926 61871->61837 61874 4dfd96 61875 4dfdbc 61874->61875 61927 4fdfc0 CreateMutexExW 61874->61927 61875->61651 61923 4db8c0 CreateMutexExW 61877->61923 61879 4dfc1e 61880 4dfc3f 61879->61880 61924 4fdfc0 CreateMutexExW 61879->61924 61880->61651 61883 4e0966 61882->61883 61883->61882 61884 4e0999 61883->61884 61885 50a860 CreateMutexExW 61883->61885 61884->61651 61885->61883 61887 4dedea 61886->61887 61887->61886 61889 4dee25 61887->61889 61934 4ce620 CreateMutexExW 61887->61934 61935 4db8c0 CreateMutexExW 61889->61935 61891 4dee88 61893 4deee5 61891->61893 61936 4d4020 CreateMutexExW 61891->61936 61894 4def12 61893->61894 61937 4fdbc0 CreateMutexExW 61893->61937 61894->61651 61896->61651 61898 4e51a6 61897->61898 61898->61897 61899 4e51df 61898->61899 61905 4fd320 CreateMutexExW 61898->61905 61906 4e5240 CreateMutexExW 61899->61906 61902 4e521f 61902->61819 61903->61819 61904->61819 61905->61899 61906->61902 61907->61837 61908->61837 61909->61837 61910->61837 61911->61837 61912->61837 61913->61837 61914->61837 61915->61837 61916->61837 61917->61837 61918->61837 61919->61833 61920->61834 61921->61846 61922->61847 61923->61879 61924->61880 61925->61837 61926->61874 61927->61875 61928->61868 61929->61849 61930->61854 61931->61837 61932->61853 61933->61857 61934->61889 61935->61891 61936->61893 61937->61894 61938 4da560 61958 4da56a 61938->61958 61954 4ac0e0 CreateMutexExW 61954->61958 61957 4da84e 62049 4ac340 CreateMutexExW 61957->62049 61958->61938 61958->61954 61958->61957 61962 4aca00 61958->61962 61977 4a1cc0 61958->61977 61983 4daa00 61958->61983 61997 4d24c0 61958->61997 62010 4e9400 61958->62010 62024 4e89a0 CreateMutexExW 61958->62024 62025 50cd80 CreateMutexExW 61958->62025 62026 4e84a0 CreateMutexExW 61958->62026 62027 4a50a0 CreateMutexExW 61958->62027 62028 4f2c40 CreateMutexExW 61958->62028 62029 5012a0 CreateMutexExW 61958->62029 62030 4ab0c0 CreateMutexExW 61958->62030 62031 4f0be0 CreateMutexExW 61958->62031 62032 4b72e0 CreateMutexExW 61958->62032 62033 4edf00 61958->62033 62047 4a8600 CreateMutexExW 61958->62047 62048 4e45a0 CreateMutexExW 61958->62048 62050 50a860 CreateMutexExW 61958->62050 61961 4da85c 61973 4aca0a 61962->61973 61963 4d9160 CreateMutexExW 61963->61973 61964 4d88e0 CreateMutexExW 61964->61973 61965 4d8ea0 CreateMutexExW 61965->61973 61966 4acacb 62051 4c5940 61966->62051 61967 4d8f80 CreateMutexExW 61967->61973 61970 4d8940 CreateMutexExW 61970->61973 61972 50a860 CreateMutexExW 61972->61973 61973->61962 61973->61963 61973->61964 61973->61965 61973->61966 61973->61967 61973->61970 61973->61972 61974 4acb62 61974->61958 61975 4acadc 61975->61974 61976 4b71a0 CreateMutexExW 61975->61976 61976->61975 61978 4a1cc6 61977->61978 61978->61977 62114 4a2260 61978->62114 61980 4a1cdd 62122 4a1d20 CreateMutexExW 61980->62122 61982 4a1cec 61982->61958 61984 4daa0a 61983->61984 61984->61983 61985 4daa45 61984->61985 62126 50f3c0 CreateMutexExW 61984->62126 61987 4ac0e0 CreateMutexExW 61985->61987 61988 4daa53 61987->61988 61989 4daa5d 61988->61989 62127 4da9a0 CreateMutexExW 61988->62127 62128 4e88c0 CreateMutexExW 61989->62128 61992 4daa85 61993 4daae5 61992->61993 62129 504f40 CreateMutexExW 61992->62129 62130 4ac340 CreateMutexExW 61993->62130 61996 4dab05 61996->61958 61999 4d24ca 61997->61999 61998 4d3a00 CreateMutexExW 61998->61999 61999->61997 61999->61998 62000 4d261c 61999->62000 62009 4d26cb 61999->62009 62001 4d3ae0 CreateMutexExW 62000->62001 62002 4d2631 62001->62002 62143 50dd00 CreateMutexExW 62002->62143 62004 4d266f 62005 4d3b60 CreateMutexExW 62004->62005 62006 4d268d 62005->62006 62131 4d1ce0 62006->62131 62008 4d26a5 62008->61958 62009->61958 62012 4e940a 62010->62012 62012->62010 62149 4a8600 CreateMutexExW 62012->62149 62013 4e944b 62150 504fc0 CreateMutexExW 62013->62150 62015 4e94a5 62151 4e9700 CreateMutexExW 62015->62151 62017 4e94fe 62152 4e9700 CreateMutexExW 62017->62152 62019 4e950f 62153 4a8600 CreateMutexExW 62019->62153 62021 4e954f 62154 50b340 CreateMutexExW 62021->62154 62023 4e9554 62023->61958 62024->61958 62025->61958 62026->61958 62027->61958 62028->61958 62029->61958 62030->61958 62031->61958 62032->61958 62044 4edf0a 62033->62044 62034 50a860 CreateMutexExW 62034->62044 62035 4b41e0 CreateMutexExW 62035->62044 62036 4edf93 62036->61958 62037 4ac0e0 CreateMutexExW 62037->62044 62041 4ac340 CreateMutexExW 62041->62044 62043 4ee0ad 62043->61958 62044->62033 62044->62034 62044->62035 62044->62036 62044->62037 62044->62041 62045 4ee05b 62044->62045 62155 4c63c0 62044->62155 62161 4c7860 CreateMutexExW 62044->62161 62163 4ed880 CreateMutexExW 62044->62163 62164 4edbc0 CreateMutexExW 62044->62164 62045->62043 62162 4f73c0 CreateMutexExW 62045->62162 62047->61958 62048->61958 62049->61961 62050->61958 62052 4c594a 62051->62052 62052->62051 62087 4b7080 CreateMutexExW 62052->62087 62054 4c597e 62088 4b7080 CreateMutexExW 62054->62088 62056 4c59a5 62089 4b7080 CreateMutexExW 62056->62089 62058 4c59c9 62090 4b7080 CreateMutexExW 62058->62090 62060 4c59ed 62091 4b7080 CreateMutexExW 62060->62091 62062 4c5a11 62092 4b7080 CreateMutexExW 62062->62092 62064 4c5a35 62093 4b7080 CreateMutexExW 62064->62093 62066 4c5a59 62094 4b7080 CreateMutexExW 62066->62094 62068 4c5a7d 62072 4c8be0 62068->62072 62071 4b2fe0 CreateMutexExW 62071->61975 62073 4c8bea 62072->62073 62073->62072 62074 4c8c0a 62073->62074 62078 4d8f80 CreateMutexExW 62073->62078 62082 4d88e0 CreateMutexExW 62073->62082 62083 4d9160 CreateMutexExW 62073->62083 62084 4d8b20 CreateMutexExW 62073->62084 62085 4d8940 CreateMutexExW 62073->62085 62108 50a860 CreateMutexExW 62073->62108 62095 4cefe0 62074->62095 62076 4c8c56 62099 4cb0e0 62076->62099 62078->62073 62079 4c8c65 62104 4c1860 62079->62104 62082->62073 62083->62073 62084->62073 62085->62073 62087->62054 62088->62056 62089->62058 62090->62060 62091->62062 62092->62064 62093->62066 62094->62068 62097 4cefe6 62095->62097 62096 4adc80 CreateMutexExW 62098 4cf01a 62096->62098 62097->62095 62097->62096 62098->62076 62102 4cb0ea 62099->62102 62100 4cb1e5 62100->62079 62101 4b47e0 CreateMutexExW 62101->62102 62102->62099 62102->62100 62102->62101 62109 50a860 CreateMutexExW 62102->62109 62105 4c186a 62104->62105 62105->62104 62110 4cbaa0 62105->62110 62107 4acad7 62107->62071 62108->62073 62109->62102 62111 4cbaa6 62110->62111 62111->62110 62112 4b47e0 CreateMutexExW 62111->62112 62113 4cbac5 62112->62113 62113->62107 62116 4a226a 62114->62116 62115 4a259e 62121 4a2765 62115->62121 62125 50c240 CreateMutexExW 62115->62125 62116->62114 62119 4a23db 62116->62119 62123 50c240 CreateMutexExW 62116->62123 62119->62115 62124 50c240 CreateMutexExW 62119->62124 62121->61980 62122->61982 62123->62119 62124->62115 62125->62121 62126->61985 62127->61989 62128->61992 62129->61993 62130->61996 62132 4d1cea 62131->62132 62132->62131 62144 4d3be0 62132->62144 62135 4d1dfa 62135->62008 62137 4d1d5d 62138 4d1df4 62137->62138 62148 50dd00 CreateMutexExW 62137->62148 62138->62008 62140 4d1d9a 62141 4d3be0 CreateMutexExW 62140->62141 62142 4d1ddc 62141->62142 62142->62008 62143->62004 62145 4d3a00 CreateMutexExW 62144->62145 62146 4d1d25 62145->62146 62146->62135 62147 4d18c0 CreateMutexExW 62146->62147 62147->62137 62148->62140 62149->62013 62150->62015 62151->62017 62152->62019 62153->62021 62154->62023 62156 4c63c6 62155->62156 62156->62155 62157 4c63d2 62156->62157 62165 50a860 CreateMutexExW 62156->62165 62158 4c6760 CreateMutexExW 62157->62158 62160 4c63d9 62158->62160 62160->62044 62161->62044 62162->62043 62163->62044 62164->62044 62165->62156 62166 4d2320 62167 4d232a 62166->62167 62167->62166 62188 4d1a20 62167->62188 62169 4d235d 62198 4ec600 62169->62198 62177 4d2376 62245 4d1980 CreateMutexExW 62177->62245 62179 4d2385 62230 4d2240 62179->62230 62181 4d238a 62237 4d1e20 62181->62237 62183 4d238f 62184 4d3ae0 CreateMutexExW 62183->62184 62185 4d23c5 62184->62185 62186 4d3b60 CreateMutexExW 62185->62186 62187 4d2405 62186->62187 62189 4d1a2a 62188->62189 62189->62188 62190 4d3be0 CreateMutexExW 62189->62190 62191 4d1be9 62189->62191 62196 4d18c0 CreateMutexExW 62189->62196 62197 50a860 CreateMutexExW 62189->62197 62190->62189 62246 4d18c0 CreateMutexExW 62191->62246 62193 4d1c05 62247 4d18c0 CreateMutexExW 62193->62247 62195 4d1c45 62195->62169 62196->62189 62197->62189 62199 4ec60a 62198->62199 62199->62198 62200 4d3a00 CreateMutexExW 62199->62200 62201 4ec62a 62200->62201 62202 4d3ae0 CreateMutexExW 62201->62202 62203 4ec645 62202->62203 62204 4d3b60 CreateMutexExW 62203->62204 62205 4ec685 62204->62205 62206 4d3ae0 CreateMutexExW 62205->62206 62207 4d2365 62206->62207 62208 4ec760 62207->62208 62209 4ec76a 62208->62209 62209->62208 62210 4d3b60 CreateMutexExW 62209->62210 62211 4ec797 62210->62211 62212 4d3b60 CreateMutexExW 62211->62212 62213 4ec7ce 62212->62213 62214 4d3b60 CreateMutexExW 62213->62214 62215 4d236a 62214->62215 62216 4d1fe0 62215->62216 62227 4d1fea 62216->62227 62217 4d3c60 CreateMutexExW 62217->62227 62218 4d2037 62219 4d3ae0 CreateMutexExW 62218->62219 62221 4d2065 62219->62221 62220 4d3be0 CreateMutexExW 62220->62227 62244 4d1f20 CreateMutexExW 62221->62244 62222 4d88e0 CreateMutexExW 62222->62227 62223 4d18c0 CreateMutexExW 62223->62227 62224 4d9160 CreateMutexExW 62224->62227 62225 4d8ea0 CreateMutexExW 62225->62227 62226 4d8b20 CreateMutexExW 62226->62227 62227->62216 62227->62217 62227->62218 62227->62220 62227->62221 62227->62222 62227->62223 62227->62224 62227->62225 62227->62226 62228 4d8940 CreateMutexExW 62227->62228 62229 50a860 CreateMutexExW 62227->62229 62228->62227 62229->62227 62231 4d2252 62230->62231 62231->62230 62232 4d3ae0 CreateMutexExW 62231->62232 62233 4d22a5 62232->62233 62234 4d22d8 62233->62234 62235 4d3a00 CreateMutexExW 62233->62235 62234->62181 62236 4d22f9 62235->62236 62236->62181 62238 4d1e2a 62237->62238 62238->62237 62239 4d3be0 CreateMutexExW 62238->62239 62242 4d1e71 62239->62242 62240 4d3ae0 CreateMutexExW 62241 4d1ebd 62240->62241 62241->62183 62242->62240 62243 4d1f0b 62242->62243 62243->62183 62244->62177 62245->62179 62246->62193 62247->62195 62248 4ef140 62286 4ef152 62248->62286 62249 4d88e0 CreateMutexExW 62249->62286 62251 4ef4c6 62253 4ef4db 62251->62253 62310 4efe00 CreateMutexExW 62251->62310 62252 4ef511 62258 4ef54f 62252->62258 62313 4f3a00 CreateMutexExW 62252->62313 62257 4ef4fe 62253->62257 62311 4e1620 CreateMutexExW 62253->62311 62255 4ef622 62287 4ef66a 62255->62287 62316 4d88e0 CreateMutexExW 62255->62316 62312 4e1220 CreateMutexExW 62257->62312 62258->62255 62259 4ef5ad 62258->62259 62314 4db8c0 CreateMutexExW 62259->62314 62262 4d88e0 CreateMutexExW 62262->62287 62265 4ef634 62317 4d9160 CreateMutexExW 62265->62317 62266 4ef5c9 62293 4eed00 62266->62293 62267 4d9160 CreateMutexExW 62267->62287 62271 4ef645 62318 4d8ea0 CreateMutexExW 62271->62318 62276 4ef651 62319 4d9160 CreateMutexExW 62276->62319 62277 4ef5f2 62279 4d8fe0 CreateMutexExW 62279->62286 62280 4ef665 62320 4d8940 CreateMutexExW 62280->62320 62282 4d9160 CreateMutexExW 62282->62286 62283 4f8fa0 CreateMutexExW 62283->62286 62284 4d8fe0 CreateMutexExW 62284->62287 62285 4d8b20 CreateMutexExW 62285->62286 62286->62248 62286->62249 62286->62251 62286->62252 62286->62279 62286->62282 62286->62283 62286->62285 62288 50a860 CreateMutexExW 62286->62288 62291 4d90e0 CreateMutexExW 62286->62291 62292 4d8940 CreateMutexExW 62286->62292 62323 4d8ea0 CreateMutexExW 62286->62323 62324 4f2e60 CreateMutexExW 62286->62324 62287->62262 62287->62267 62287->62284 62289 4d8940 CreateMutexExW 62287->62289 62321 50a860 CreateMutexExW 62287->62321 62322 4d8ea0 CreateMutexExW 62287->62322 62288->62286 62289->62287 62291->62286 62292->62286 62294 4eed0f 62293->62294 62294->62293 62295 50a860 CreateMutexExW 62294->62295 62296 4eed32 62294->62296 62295->62294 62297 4edf00 CreateMutexExW 62296->62297 62298 4eede5 62297->62298 62300 4eee54 62298->62300 62302 4eee8a 62298->62302 62329 50a860 CreateMutexExW 62298->62329 62330 4eeba0 CreateMutexExW 62300->62330 62325 4f7580 CreateMutexExW 62302->62325 62305 4eefcd 62309 4eeff7 62305->62309 62326 4ee800 CreateMutexExW 62305->62326 62327 4f7bc0 CreateMutexExW 62305->62327 62308 4ef02d 62315 4db8c0 CreateMutexExW 62308->62315 62328 4ee280 CreateMutexExW 62309->62328 62310->62253 62311->62257 62312->62252 62313->62258 62314->62266 62315->62277 62316->62265 62317->62271 62318->62276 62319->62280 62320->62287 62321->62287 62322->62287 62323->62286 62324->62286 62325->62305 62326->62305 62327->62305 62328->62308 62329->62300 62330->62302 62331 4e5cc0 62332 4e5cca 62331->62332 62332->62331 62334 4d3d60 CreateMutexExW 62332->62334 62336 4e5d27 62332->62336 62333 4d3b60 CreateMutexExW 62335 4e5d7a 62333->62335 62334->62336 62336->62333 62337 510940 62338 510974 62337->62338 62339 51096f 62337->62339 62346 4e1000 62338->62346 62360 4da180 CreateMutexExW 62339->62360 62347 4e100a 62346->62347 62347->62346 62348 4e1068 62347->62348 62362 4fdea0 CreateMutexExW 62347->62362 62363 4db8c0 CreateMutexExW 62348->62363 62351 4e11e6 62352 4e0d20 CreateMutexExW 62351->62352 62353 4e11eb 62352->62353 62361 4da1c0 CreateMutexExW 62353->62361 62354 4e107c 62354->62351 62364 4db8c0 CreateMutexExW 62354->62364 62356 4e117a 62357 4e1199 62356->62357 62365 4fdfc0 CreateMutexExW 62356->62365 62359 4dede0 CreateMutexExW 62357->62359 62359->62351 62362->62348 62363->62354 62364->62356 62365->62357 62366 510720 62367 510740 62366->62367 62370 5175e0 62367->62370 62369 510889 62373 4e3060 62370->62373 62375 4e3066 62373->62375 62374 5109c0 CreateMutexExW 62376 4e309f 62374->62376 62375->62373 62375->62374 62376->62369 62377 4de499 62378 4de4a4 62377->62378 62379 4de4b2 62377->62379 62380 4ac0e0 CreateMutexExW 62378->62380 62380->62379 62381 4dddd5 62382 4ddea7 62381->62382 62392 4ddda0 62381->62392 62393 4ddf20 62382->62393 62384 4ddeac 62385 4ac0e0 CreateMutexExW 62385->62392 62386 4dde32 62388 4dde69 62386->62388 62410 4ac440 CreateMutexExW 62386->62410 62411 4ac340 CreateMutexExW 62388->62411 62391 4dde77 62392->62381 62392->62382 62392->62385 62392->62386 62412 50a860 CreateMutexExW 62392->62412 62397 4ddf2a 62393->62397 62394 4ddfc3 62429 4e9ba0 CreateMutexExW 62394->62429 62396 4ddf5c 62427 4e9ba0 CreateMutexExW 62396->62427 62397->62393 62397->62394 62397->62396 62431 50a860 CreateMutexExW 62397->62431 62398 4ddfd4 62413 4d30c0 62398->62413 62402 4ddf85 62404 5125c0 CreateMutexExW 62402->62404 62405 4ddf9f 62404->62405 62428 4e9cc0 CreateMutexExW 62405->62428 62408 4ddfea 62408->62384 62409 4ddfbd 62409->62384 62410->62388 62411->62391 62412->62392 62414 4d3d60 CreateMutexExW 62413->62414 62415 4d30f5 62414->62415 62416 4d3111 62415->62416 62420 4d313e 62415->62420 62417 4d3ae0 CreateMutexExW 62416->62417 62418 4d3126 62417->62418 62430 4e9cc0 CreateMutexExW 62418->62430 62419 4ac0e0 CreateMutexExW 62419->62420 62420->62419 62422 4d9160 CreateMutexExW 62420->62422 62432 4d88e0 CreateMutexExW 62420->62432 62433 4d8f80 CreateMutexExW 62420->62433 62434 4d8ea0 CreateMutexExW 62420->62434 62435 4d8940 CreateMutexExW 62420->62435 62436 50a860 CreateMutexExW 62420->62436 62422->62420 62427->62402 62428->62409 62429->62398 62430->62408 62431->62397 62432->62420 62433->62420 62434->62420 62435->62420 62436->62420 62437 50598c 62438 505995 62437->62438 62445 505940 62437->62445 62439 4adc80 CreateMutexExW 62438->62439 62440 5059e8 62439->62440 62441 50a860 CreateMutexExW 62441->62445 62442 505f05 62478 4b3380 CreateMutexExW 62442->62478 62444 505b36 62445->62437 62445->62441 62445->62442 62446 505aea 62445->62446 62454 505d35 62445->62454 62446->62444 62447 4ad720 CreateMutexExW 62446->62447 62451 505c1f 62446->62451 62447->62451 62449 505fef 62450 506025 62449->62450 62480 4be700 CreateMutexExW 62449->62480 62453 506053 62450->62453 62481 4ada80 CreateMutexExW 62450->62481 62451->62449 62479 4b20e0 CreateMutexExW 62451->62479 62461 506131 62453->62461 62482 4ad9a0 CreateMutexExW 62453->62482 62454->62451 62467 4ad720 62454->62467 62458 5061ee 62459 506274 62458->62459 62485 4b75c0 CreateMutexExW 62458->62485 62461->62458 62484 4f7240 CreateMutexExW 62461->62484 62462 506265 62462->62459 62486 4b76c0 CreateMutexExW 62462->62486 62463 5060c8 62463->62461 62483 4b20e0 CreateMutexExW 62463->62483 62477 4ad72a 62467->62477 62468 4b2320 CreateMutexExW 62468->62477 62470 4ad7fd 62470->62451 62471 50a860 CreateMutexExW 62471->62477 62472 4d88e0 CreateMutexExW 62472->62477 62473 4d9160 CreateMutexExW 62473->62477 62474 4d8ea0 CreateMutexExW 62474->62477 62475 4d8b20 CreateMutexExW 62475->62477 62476 4d8940 CreateMutexExW 62476->62477 62477->62467 62477->62468 62477->62470 62477->62471 62477->62472 62477->62473 62477->62474 62477->62475 62477->62476 62487 4b3120 62477->62487 62478->62451 62479->62449 62480->62450 62481->62453 62482->62463 62483->62461 62484->62458 62485->62462 62486->62459 62492 4b312a 62487->62492 62490 50a860 CreateMutexExW 62490->62492 62491 4b3286 62511 4bf8a0 CreateMutexExW 62491->62511 62492->62487 62492->62490 62492->62491 62496 4b3840 62492->62496 62509 4cfec0 CreateMutexExW 62492->62509 62510 4cffa0 CreateMutexExW 62492->62510 62494 4b32cb 62494->62477 62498 4b384a 62496->62498 62498->62496 62501 4b39b5 62498->62501 62502 4fd860 CreateMutexExW 62498->62502 62504 4cfa40 CreateMutexExW 62498->62504 62505 4c2d00 CreateMutexExW 62498->62505 62507 4cf880 CreateMutexExW 62498->62507 62508 4c28a0 CreateMutexExW 62498->62508 62512 4b3d80 62498->62512 62516 4c46a0 CreateMutexExW 62498->62516 62517 4fd6e0 CreateMutexExW 62498->62517 62518 50a860 CreateMutexExW 62498->62518 62519 4b2320 CreateMutexExW 62498->62519 62501->62492 62502->62498 62504->62498 62505->62498 62507->62498 62508->62498 62509->62492 62510->62492 62511->62494 62513 4b3d8a 62512->62513 62513->62512 62520 4c62a0 62513->62520 62515 4b3dd2 62515->62498 62516->62498 62517->62498 62518->62498 62519->62498 62521 4c62a6 62520->62521 62521->62520 62522 5109c0 CreateMutexExW 62521->62522 62523 4c62fb 62522->62523 62523->62515

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 281 4d1a20-4d1a24 282 4d1a2a-4d1a60 call 4d3be0 281->282 283 4d1cb7-4d1cc0 call 510ae0 281->283 287 4d1a65-4d1a83 282->287 283->281 288 4d1a89-4d1aa4 call 4d18c0 287->288 289 4d1ca5-4d1cb6 call 50a860 287->289 294 4d1ab9-4d1b09 call 4d3be0 288->294 295 4d1aa6-4d1ab5 call 512a20 288->295 289->283 300 4d1b0f-4d1b2f call 4d18c0 294->300 301 4d1c90-4d1ca0 call 50a860 294->301 295->294 305 4d1b44-4d1b4e 300->305 306 4d1b31-4d1b40 call 512a20 300->306 301->289 308 4d1be9-4d1c0c call 4d18c0 305->308 309 4d1b54-4d1b74 call 4d18c0 305->309 306->305 315 4d1c0e-4d1c1d call 512a20 308->315 316 4d1c21-4d1c4c call 4d18c0 308->316 317 4d1b89-4d1b93 309->317 318 4d1b76-4d1b85 call 512a20 309->318 315->316 329 4d1c4e-4d1c5d call 512a20 316->329 330 4d1c61-4d1c6d 316->330 319 4d1c7f-4d1c8b call 50a860 317->319 320 4d1b99-4d1bb9 call 4d18c0 317->320 318->317 319->301 333 4d1bbb-4d1bcf call 512a20 320->333 334 4d1bd3-4d1be3 320->334 329->330 333->334 334->308 337 4d1c6e-4d1c7a call 50a860 334->337 337->319
    Strings
    • RtlGetCurrentPeb, xrefs: 004D1BEE
    • NtCreateWaitCompletionPacket exists but NtCancelWaitCompletionPacket does notcrypto/tls: ExportKeyingMaterial is unavailable when renegotiation is enabled1157920892103562487626974469494075735300861434152903141955336313088670978539511157920892103562487626974469, xrefs: 004D1C6E
    • bcryptprimitives.dll not foundpanic called with nil argumentcheckdead: inconsistent countsrunqputslow: queue is not fullruntime: bad pointer in frame invalid pointer found on stack locals stack map entries for abi mismatch detected between runtime: impossible , xrefs: 004D1CA5
    • ntdll.dll, xrefs: 004D1AC7
    • bcryptprimitives.dll, xrefs: 004D1A39
    • NtAssociateWaitCompletionPacket, xrefs: 004D1B59
    • ProcessPrng, xrefs: 004D1A89
    • NtCreateWaitCompletionPacket exists but NtAssociateWaitCompletionPacket does nottls: either ServerName or InsecureSkipVerify must be specified in the tls.Configx509: invalid signature: parent certificate cannot sign this kind of certificatecrypto/ecdh: interna, xrefs: 004D1C7F
    • RtlGetVersion, xrefs: 004D1C2D
    • NtCreateWaitCompletionPacket, xrefs: 004D1B14
    • NtCancelWaitCompletionPacket, xrefs: 004D1B9E
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: NtAssociateWaitCompletionPacket$NtCancelWaitCompletionPacket$NtCreateWaitCompletionPacket$NtCreateWaitCompletionPacket exists but NtAssociateWaitCompletionPacket does nottls: either ServerName or InsecureSkipVerify must be specified in the tls.Configx509: invalid signature: parent certificate cannot sign this kind of certificatecrypto/ecdh: interna$NtCreateWaitCompletionPacket exists but NtCancelWaitCompletionPacket does notcrypto/tls: ExportKeyingMaterial is unavailable when renegotiation is enabled1157920892103562487626974469494075735300861434152903141955336313088670978539511157920892103562487626974469$ProcessPrng$RtlGetCurrentPeb$RtlGetVersion$bcryptprimitives.dll$bcryptprimitives.dll not foundpanic called with nil argumentcheckdead: inconsistent countsrunqputslow: queue is not fullruntime: bad pointer in frame invalid pointer found on stack locals stack map entries for abi mismatch detected between runtime: impossible $ntdll.dll
    • API String ID: 0-2665925792
    • Opcode ID: d14ec9f81416f937dcbc824ddd27e7cb71291b0541af7be1fc8804a947bf4af7
    • Instruction ID: 5625ae0f565310679787ec37562e25a8dfabbf16a404a31a97ea4309553a6879
    • Opcode Fuzzy Hash: d14ec9f81416f937dcbc824ddd27e7cb71291b0541af7be1fc8804a947bf4af7
    • Instruction Fuzzy Hash: 6B616535245B85D5EB11EB51F8983AA77A4F789B80F488127EA9C033B6EF7CC584C705

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 340 4acd80-4acd89 341 4acd8f-4acdd2 340->341 342 4ad506-4ad533 call 510ae0 340->342 343 4acddb-4acdf9 call 4ae020 341->343 344 4acdd4-4acdd6 341->344 342->340 354 4acdfb-4ace20 343->354 355 4ace25 343->355 346 4ad1a7-4ad1ad 344->346 349 4ad2d2-4ad2e1 346->349 350 4ad1b3-4ad1d4 346->350 356 4ad2e4-4ad2e7 349->356 352 4ad1d6-4ad1e3 350->352 353 4ad1e5-4ad207 350->353 359 4ad261-4ad267 352->359 360 4ad209-4ad20c 353->360 361 4ad20e-4ad220 call 4b47e0 353->361 354->346 362 4ace2a-4acea3 355->362 357 4ad3ab-4ad3b5 356->357 358 4ad2ed-4ad303 call 4ad540 356->358 365 4ad3d0-4ad3e9 357->365 366 4ad3b7-4ad3ce 357->366 381 4ad309-4ad3a1 call 4b71a0 * 2 358->381 382 4ad445-4ad451 358->382 367 4ad269-4ad26c 359->367 368 4ad2be-4ad2d0 359->368 360->359 371 4ad225-4ad259 361->371 377 4acea9-4aceb4 362->377 378 4ad105-4ad110 362->378 375 4ad3fa-4ad426 365->375 376 4ad3eb-4ad3f8 365->376 372 4ad42a-4ad42d 366->372 373 4ad272-4ad2b9 call 4b4700 367->373 374 4ad176-4ad1a4 367->374 368->356 371->359 384 4ad42f-4ad436 372->384 385 4ad465-4ad505 call 4d88e0 call 4d9160 call 4d8fe0 call 4d9160 call 4d8fe0 call 4d9160 * 2 call 4d8b20 call 4d8940 call 50a860 372->385 373->374 374->346 375->372 376->372 379 4aceba-4aceca 377->379 380 4ad169-4ad171 call 512de0 377->380 386 4aced0-4acf05 call 4d3c60 379->386 387 4acf77-4acf88 379->387 380->374 381->357 392 4ad438-4ad440 384->392 393 4ad452-4ad460 call 50a860 384->393 385->342 400 4acf0a-4acf24 386->400 398 4acf8e-4acfbb call 4ae020 387->398 399 4ad147-4ad153 call 50a860 387->399 392->362 393->385 414 4acfdc-4acfe7 398->414 415 4acfbd-4acfd6 call 4adc80 398->415 406 4ad158-4ad164 call 50a860 399->406 405 4acf2a-4acf39 400->405 400->406 410 4acf3b-4acf3c 405->410 411 4acf3e 405->411 406->380 418 4acf3f-4acf6d 410->418 411->418 416 4ad0ee-4ad0fb 414->416 417 4acfed-4ad007 414->417 415->414 430 4ad136-4ad142 call 50a860 415->430 416->378 421 4ad00d-4ad019 417->421 422 4ad0b6-4ad0cb 417->422 418->387 425 4ad01b 421->425 426 4ad022-4ad043 call 4adc80 421->426 428 4ad11c-4ad120 call 512e40 422->428 429 4ad0cd-4ad0d7 422->429 425->426 439 4ad125-4ad131 call 50a860 426->439 441 4ad049-4ad08e 426->441 428->439 435 4ad0d9-4ad0e9 429->435 436 4ad111-4ad117 call 512dc0 429->436 430->399 436->428 439->430 444 4ad090-4ad099 call 5137a0 441->444 445 4ad0a1-4ad0ae 441->445 444->445 445->422
    Strings
    • arena already initialized to unused region of span bytes failed with errno=runtime: VirtualAlloc of /sched/gomaxprocs:threadsremaining pointer buffersslice bounds out of range_cgo_thread_start missingallgadd: bad status Gidleruntime: program exceeds startm: p , xrefs: 004AD147
    • out of memory allocating heap arena metadata/cpu/classes/scavenge/background:cpu-secondsruntime: unexpected metric registration for gcmarknewobject called while doing checkmarkactive sweepers found at start of mark phaseno P available, write barriers are forbi, xrefs: 004AD136
    • base outside usable address spaceruntime: memory allocated by OS [misrounded allocation in sysAllocconcurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-c, xrefs: 004AD3F1
    • ) not in usable address space: runtime: cannot allocate memorycheckmark found unmarked objectruntime: failed to commit pages/memory/classes/heap/free:bytes/memory/classes/os-stacks:bytespacer: sweep done at heap size non in-use span in unswept listruntime.Pinn, xrefs: 004AD4C5
    • memory reservation exceeds address space limittried to park scavenger from another goroutinereleased less than one physical page of memory (bad use of unsafe.Pointer? try -d=checkptr)sysGrow bounds not aligned to pallocChunkBytesruntime: failed to create new , xrefs: 004AD4F2
    • , xrefs: 004AD40F
    • region exceeds uintptr range/gc/heap/frees-by-size:bytes/gc/heap/tiny/allocs:objects/sched/goroutines:goroutinesgcBgMarkWorker: mode not setmspan.sweep: m is not lockedfound pointer to free objectmheap.freeSpanLocked - span runtime.semasleep unexpectedfatal: m, xrefs: 004AD3C7
    • out of memory allocating allArenas/memory/classes/heap/objects:bytesruntime.SetFinalizer: cannot pass too many pages allocated in chunk?mspan.ensureSwept: m is not lockedruntime: source value is too largeVirtualQuery for stack base failedforEachP: sched.safePo, xrefs: 004AD125
    • end outside usable address spaceGCProg for type that isn't largeruntime: failed to release pagesruntime: fixalloc size too largeinvalid limiter event type foundscanstack: goroutine not stoppedscavenger state is already wiredsweep increased allocation countremo, xrefs: 004AD41F
    • out of memory allocating heap arena map/cpu/classes/gc/mark/assist:cpu-seconds/cpu/classes/scavenge/total:cpu-seconds/memory/classes/profiling/buckets:bytesmspan.sweep: bad span state after sweepruntime: blocked write on free polldescPowerRegisterSuspendResume, xrefs: 004AD158
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: $) not in usable address space: runtime: cannot allocate memorycheckmark found unmarked objectruntime: failed to commit pages/memory/classes/heap/free:bytes/memory/classes/os-stacks:bytespacer: sweep done at heap size non in-use span in unswept listruntime.Pinn$arena already initialized to unused region of span bytes failed with errno=runtime: VirtualAlloc of /sched/gomaxprocs:threadsremaining pointer buffersslice bounds out of range_cgo_thread_start missingallgadd: bad status Gidleruntime: program exceeds startm: p $base outside usable address spaceruntime: memory allocated by OS [misrounded allocation in sysAllocconcurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-c$end outside usable address spaceGCProg for type that isn't largeruntime: failed to release pagesruntime: fixalloc size too largeinvalid limiter event type foundscanstack: goroutine not stoppedscavenger state is already wiredsweep increased allocation countremo$memory reservation exceeds address space limittried to park scavenger from another goroutinereleased less than one physical page of memory (bad use of unsafe.Pointer? try -d=checkptr)sysGrow bounds not aligned to pallocChunkBytesruntime: failed to create new $out of memory allocating allArenas/memory/classes/heap/objects:bytesruntime.SetFinalizer: cannot pass too many pages allocated in chunk?mspan.ensureSwept: m is not lockedruntime: source value is too largeVirtualQuery for stack base failedforEachP: sched.safePo$out of memory allocating heap arena map/cpu/classes/gc/mark/assist:cpu-seconds/cpu/classes/scavenge/total:cpu-seconds/memory/classes/profiling/buckets:bytesmspan.sweep: bad span state after sweepruntime: blocked write on free polldescPowerRegisterSuspendResume$out of memory allocating heap arena metadata/cpu/classes/scavenge/background:cpu-secondsruntime: unexpected metric registration for gcmarknewobject called while doing checkmarkactive sweepers found at start of mark phaseno P available, write barriers are forbi$region exceeds uintptr range/gc/heap/frees-by-size:bytes/gc/heap/tiny/allocs:objects/sched/goroutines:goroutinesgcBgMarkWorker: mode not setmspan.sweep: m is not lockedfound pointer to free objectmheap.freeSpanLocked - span runtime.semasleep unexpectedfatal: m
    • API String ID: 0-3600667164
    • Opcode ID: 0e3be30211e3d7b79e14fddc74f5ade33f8899b552719ec72cc39670c313594b
    • Instruction ID: 5c82ddb60de0374122cbbd0ece3c3ab698405564cd472a15178caaf25d556896
    • Opcode Fuzzy Hash: 0e3be30211e3d7b79e14fddc74f5ade33f8899b552719ec72cc39670c313594b
    • Instruction Fuzzy Hash: EA02AC72608BC482EB60CB12F4503AAB764F79AB94F448226EF9D57B99CF7CC485C705

    Control-flow Graph

    Strings
    • runtime.minit: duplicatehandle failed; errno=runtime: CreateWaitableTimerEx failed; errno=exitsyscall: syscall frame is no longer validunsafe.String: ptr is nil and len is not zerocontext: internal error: missing cancel errortls: internal error: unexpected ren, xrefs: 004D3757
    • runtime: CreateWaitableTimerEx failed; errno=exitsyscall: syscall frame is no longer validunsafe.String: ptr is nil and len is not zerocontext: internal error: missing cancel errortls: internal error: unexpected renegotiationcannot send after transport endpoin, xrefs: 004D3697, 004D36F7
    • runtime: NtCreateWaitCompletionPacket failed; errno=casfrom_Gscanstatus: gp->status is not in scan statetls: server selected unsupported protocol version %xtls: received a session ticket with invalid lifetimecrypto/rsa: PSSOptions.SaltLength cannot be negative, xrefs: 004D3637
    • VirtualQuery for stack base failedforEachP: sched.safePointWait != 0schedule: spinning with local workentersyscallblock inconsistent bp entersyscallblock inconsistent sp runtime: g is running but p is notinvalid timer channel: no capacityexpected an RSA public, xrefs: 004D360F
    • 0, xrefs: 004D34BA
    • bad g0 stackself-preempt [recovered]bad recoverybad g statusentersyscallwirep: p->m=) p->status=releasep: m= sysmonwait= preemptoff=cas64 failed m->gsignal=-byte limitruntime: sp=abi mismatchwrong timerstlsunsafeekmclose notifyremote errorc hs traffics hs tra, xrefs: 004D35AA
    • CreateWaitableTimerEx when creating timer failedruntime.preemptM: duplicatehandle failed; errno=runtime: malformed profBuf buffer - invalid sizeattempt to trace invalid or unsupported P statusruntime: waitforsingleobject wait_failed; errno=failed to parse cert, xrefs: 004D36BF, 004D371F
    • runtime: VirtualQuery failed; errno=runtime: sudog with non-nil waitlinkruntime: mcall called on m->g0 stackstartm: P required for spinning=true) is not Grunnable or Gscanrunnableruntime: bad notifyList size - sync=accessed data from freed user arena runtime:, xrefs: 004D35E7
    • NtCreateWaitCompletionPacket failedfindrunnable: netpoll with spinningpidleput: P has non-empty run queuetraceback did not unwind completelyruntime: createevent failed; errno=unsupported signature algorithm: %vtls: too many non-advancing recordstls: server sel, xrefs: 004D365F
    • runtime.minit: duplicatehandle failed_cgo_notify_runtime_init_done missingstartTheWorld: inconsistent mp->nextpruntime: unexpected SPWRITE function all goroutines are asleep - deadlock!crypto: Size of unknown hash functiontls: unsupported certificate key (%T)t, xrefs: 004D377F
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: 0$CreateWaitableTimerEx when creating timer failedruntime.preemptM: duplicatehandle failed; errno=runtime: malformed profBuf buffer - invalid sizeattempt to trace invalid or unsupported P statusruntime: waitforsingleobject wait_failed; errno=failed to parse cert$NtCreateWaitCompletionPacket failedfindrunnable: netpoll with spinningpidleput: P has non-empty run queuetraceback did not unwind completelyruntime: createevent failed; errno=unsupported signature algorithm: %vtls: too many non-advancing recordstls: server sel$VirtualQuery for stack base failedforEachP: sched.safePointWait != 0schedule: spinning with local workentersyscallblock inconsistent bp entersyscallblock inconsistent sp runtime: g is running but p is notinvalid timer channel: no capacityexpected an RSA public$bad g0 stackself-preempt [recovered]bad recoverybad g statusentersyscallwirep: p->m=) p->status=releasep: m= sysmonwait= preemptoff=cas64 failed m->gsignal=-byte limitruntime: sp=abi mismatchwrong timerstlsunsafeekmclose notifyremote errorc hs traffics hs tra$runtime.minit: duplicatehandle failed; errno=runtime: CreateWaitableTimerEx failed; errno=exitsyscall: syscall frame is no longer validunsafe.String: ptr is nil and len is not zerocontext: internal error: missing cancel errortls: internal error: unexpected ren$runtime.minit: duplicatehandle failed_cgo_notify_runtime_init_done missingstartTheWorld: inconsistent mp->nextpruntime: unexpected SPWRITE function all goroutines are asleep - deadlock!crypto: Size of unknown hash functiontls: unsupported certificate key (%T)t$runtime: CreateWaitableTimerEx failed; errno=exitsyscall: syscall frame is no longer validunsafe.String: ptr is nil and len is not zerocontext: internal error: missing cancel errortls: internal error: unexpected renegotiationcannot send after transport endpoin$runtime: NtCreateWaitCompletionPacket failed; errno=casfrom_Gscanstatus: gp->status is not in scan statetls: server selected unsupported protocol version %xtls: received a session ticket with invalid lifetimecrypto/rsa: PSSOptions.SaltLength cannot be negative$runtime: VirtualQuery failed; errno=runtime: sudog with non-nil waitlinkruntime: mcall called on m->g0 stackstartm: P required for spinning=true) is not Grunnable or Gscanrunnableruntime: bad notifyList size - sync=accessed data from freed user arena runtime:
    • API String ID: 0-1757931288
    • Opcode ID: bd391cec86971930e76634e2bee9253c1094e02d937fac941afbe07f304bcf82
    • Instruction ID: 0022e78e48f9db78c7af377a8d7560202e7a3d4d50f37f355d8e5fd339089648
    • Opcode Fuzzy Hash: bd391cec86971930e76634e2bee9253c1094e02d937fac941afbe07f304bcf82
    • Instruction Fuzzy Hash: 35C17E36604B8485E710EB26F49936E7764F78AB84F40822BEE9C43BA6DF3DC541C715

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 677 4a2260-4a2264 678 4a226a-4a2279 call 4ada40 677->678 679 4a2ae2-4a2ae7 call 510ae0 677->679 683 4a227e-4a2360 678->683 679->677 684 4a2362-4a2371 call 512a20 683->684 685 4a2375-4a23a3 call 4a2b40 683->685 684->685 690 4a23a9-4a23c5 685->690 691 4a2563-4a2566 685->691 694 4a240c-4a2433 690->694 695 4a23c7-4a23e9 call 50c240 690->695 692 4a272a-4a272d 691->692 693 4a256c-4a2588 691->693 696 4a285c-4a2882 call 4a2b00 692->696 697 4a2733-4a274f 692->697 698 4a258a-4a25ac call 50c240 693->698 699 4a25cf-4a25f6 693->699 701 4a249c-4a255b 694->701 702 4a2435-4a2498 call 512ae0 call 512a20 694->702 714 4a23eb-4a23fa call 512a20 695->714 715 4a23fe-4a2408 695->715 720 4a2888-4a2948 call 4a2b00 * 2 696->720 721 4a2adc-4a2ae1 696->721 704 4a278f-4a27b5 697->704 705 4a2751-4a2773 call 50c240 697->705 723 4a25ae-4a25bd call 512a20 698->723 724 4a25c1-4a25cb 698->724 708 4a25f8-4a265f call 512ae0 call 512a20 699->708 709 4a2663-4a2722 699->709 701->691 702->701 716 4a27b7-4a27f1 call 512aa0 704->716 717 4a27f5-4a2857 704->717 730 4a2788 705->730 731 4a2775-4a2784 call 512a20 705->731 708->709 709->692 714->715 715->694 716->717 717->696 744 4a294a-4a294e 720->744 745 4a2950-4a2972 call 4a2b20 720->745 723->724 724->699 730->704 731->730 746 4a29a1-4a29b7 744->746 752 4a297d-4a297f 745->752 753 4a2974-4a297b 745->753 748 4a29bd-4a2a59 call 4a2b00 746->748 749 4a2ad6-4a2adb 746->749 756 4a2a5b-4a2a6a 748->756 757 4a2a71-4a2a99 call 4a2b00 748->757 755 4a2980-4a2982 752->755 753->755 758 4a2999 755->758 759 4a2984-4a2988 755->759 756->757 765 4a2a9b-4a2aa0 757->765 766 4a2aa1-4a2ad5 call 4a2b00 757->766 760 4a299b-4a299d 758->760 759->758 762 4a298a-4a298e 759->762 760->746 762->758 763 4a2990-4a2997 762->763 763->760
    Strings
    • rdtscppopcntcmd/gosecretheaderAnswerLengthSTREETavx512rdrandrdseedGlobal\BooleanLayeredRoutingfloat32float64UpgradeTrailersocks5hHEADERSReferer flags= len=%d (conn) %v=%v,expiresrefererrefreshtrailerGODEBUGname %q:method:schemeupgrade:statushttp://chunkedCreat, xrefs: 004A2300
    • avx512fos/execruntimeSHA-224SHA-256SHA-384SHA-512Ed25519MD5-RSAserial:eae_prkanswers2.5.4.62.5.4.32.5.4.52.5.4.72.5.4.82.5.4.9amxtileamxint8amxbf16osxsaveAdvancedAnalyzerDatatypeDebuggerEndpointFeedbackInstanceIntervalJudgmentKeyboardLockdownManeuverModelingPi, xrefs: 004A27F5
    • adxaesshaavxfmanetMD4MD5RSADSAURIexp): TTLSET.exeopenreadtrueHost&lt;&gt;idlehttp1080DATAPINGPOSTEtag0x%xdateetagfromhostlinkvarypathDategzip%xGonefilesyncpipeStat.com.bat.cmdJuneJulyEESTSASTAKSTAKDTACSTACDTAESTAEDTAWSTCESTNZSTNZDT as hourquitbind3125Atoi-In, xrefs: 004A2286
    • sse41sse42ssse3SHA-1P-224P-256P-384P-521ECDSA (at ClassStringFormat[]bytestringactiveclosedsocks5CANCELGOAWAYPADDEDBasic CookieacceptcookieexpectoriginserverExpectstatusPragmasocks Lockedreadatrenameexec: SundayMondayFridayAugustUTC-11UTC-02UTC-08UTC-09UTC+12U, xrefs: 004A24ED
    • pclmulqdqmath/randd.nx != 0info_hashClassINETAuthorityquestionsunderflowArtificialBackgroundBinaryTreeBreakpointCalculatorCapabilityClusteringConnectionConstraintControllerCoordinateDelegationDependencyDescriptorDictionaryDispatcherDocumentedEfficiencyEncrypti, xrefs: 004A22DF
    • avx512bwavx512vlgo/typesnet/httpgo/buildx509sha1MD5+SHA1SHA3-224SHA3-256SHA3-384SHA3-512SHA1-RSADSA-SHA1DNS nameClassANYQuestion2.5.4.102.5.4.112.5.4.17avx512cdavx512eravx512pfavx512dqBjorn.iniError: %vAdvantageAdventureAggregateAlgorithmAlternateAnimationAnon, xrefs: 004A281C
    • ermssse3avx2bmi1bmi2timebitsNameTypeasn1cx16sse2BjornErro:<nil>falseError&amp;&#34;&#39;https:***@Rangeallowrangeclose:path%s %q%s=%sHTTP/socksFoundchdirwritemkdirLstatMarchApril+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930monthLocalntohsGreek1562578125in, xrefs: 004A22C1
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: adxaesshaavxfmanetMD4MD5RSADSAURIexp): TTLSET.exeopenreadtrueHost&lt;&gt;idlehttp1080DATAPINGPOSTEtag0x%xdateetagfromhostlinkvarypathDategzip%xGonefilesyncpipeStat.com.bat.cmdJuneJulyEESTSASTAKSTAKDTACSTACDTAESTAEDTAWSTCESTNZSTNZDT as hourquitbind3125Atoi-In$avx512bwavx512vlgo/typesnet/httpgo/buildx509sha1MD5+SHA1SHA3-224SHA3-256SHA3-384SHA3-512SHA1-RSADSA-SHA1DNS nameClassANYQuestion2.5.4.102.5.4.112.5.4.17avx512cdavx512eravx512pfavx512dqBjorn.iniError: %vAdvantageAdventureAggregateAlgorithmAlternateAnimationAnon$avx512fos/execruntimeSHA-224SHA-256SHA-384SHA-512Ed25519MD5-RSAserial:eae_prkanswers2.5.4.62.5.4.32.5.4.52.5.4.72.5.4.82.5.4.9amxtileamxint8amxbf16osxsaveAdvancedAnalyzerDatatypeDebuggerEndpointFeedbackInstanceIntervalJudgmentKeyboardLockdownManeuverModelingPi$ermssse3avx2bmi1bmi2timebitsNameTypeasn1cx16sse2BjornErro:<nil>falseError&amp;&#34;&#39;https:***@Rangeallowrangeclose:path%s %q%s=%sHTTP/socksFoundchdirwritemkdirLstatMarchApril+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930monthLocalntohsGreek1562578125in$pclmulqdqmath/randd.nx != 0info_hashClassINETAuthorityquestionsunderflowArtificialBackgroundBinaryTreeBreakpointCalculatorCapabilityClusteringConnectionConstraintControllerCoordinateDelegationDependencyDescriptorDictionaryDispatcherDocumentedEfficiencyEncrypti$rdtscppopcntcmd/gosecretheaderAnswerLengthSTREETavx512rdrandrdseedGlobal\BooleanLayeredRoutingfloat32float64UpgradeTrailersocks5hHEADERSReferer flags= len=%d (conn) %v=%v,expiresrefererrefreshtrailerGODEBUGname %q:method:schemeupgrade:statushttp://chunkedCreat$sse41sse42ssse3SHA-1P-224P-256P-384P-521ECDSA (at ClassStringFormat[]bytestringactiveclosedsocks5CANCELGOAWAYPADDEDBasic CookieacceptcookieexpectoriginserverExpectstatusPragmasocks Lockedreadatrenameexec: SundayMondayFridayAugustUTC-11UTC-02UTC-08UTC-09UTC+12U
    • API String ID: 0-21248499
    • Opcode ID: 8aad8ce82a85c2454ab9fe099d0c4cdcd238b7e351cddb8e88c796dd1f5e5e0e
    • Instruction ID: 34f32495012277d2e0960486f3d59fc18fd6c8203f2f82227fc1b8f976f29640
    • Opcode Fuzzy Hash: 8aad8ce82a85c2454ab9fe099d0c4cdcd238b7e351cddb8e88c796dd1f5e5e0e
    • Instruction Fuzzy Hash: 9932AC7A604B48C5E700DF6AF445B893BA4F36AB80F559227DA8D87362DF7DC0A9C341
    Strings
    • !"#$%%&&''((()))*++,,,,,------....//////0001123333333333444444444455666677777888888888889999999999::::::;;;;;;;;;;;;;;;;<<<<<<<<<<<<<<<<=====>>>>>>>>>>>??????????@@@@@@@@@@@@@@@@@@@@@@AAAAAAAAAAAAAAAAAAAAABBBBBBBBBBBCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC, xrefs: 00505CF3
    • mallocgc called without a P or outside bootstrappingruntime.SetFinalizer: pointer not in allocated blockruntime: use of FixAlloc_Alloc before FixAlloc_Initspan set block with unpopped elements found in resetruntime: GetQueuedCompletionStatusEx failed (errno= , xrefs: 005062C6
    • malloc deadlockruntime error: with GC progscan missed a gmisaligned maskruntime: min = runtime: inUse=runtime: max = requested skip=bad panic stackrecovery failedstopm holding pstartm: m has ppreempt SPWRITEmissing mcache?ms: gomaxprocs=randinit missed]mo, xrefs: 005062E8
    • mallocgc called with gcphase == _GCmarkterminationruntime.Pinner: object was allocated into an arenaruntime.Pinner: decreased non-existing pin counterrecursive call during initialization - linker skewattempt to execute system stack code on user stackcompileCal, xrefs: 005062F9
    • malloc during signalclose of nil channelinconsistent lockedmnotetsleep not on g0bad system page size to unallocated span/gc/scan/stack:bytes/gc/scan/total:bytes/gc/heap/frees:bytes/gc/gomemlimit:bytesp mcache not flushed markroot jobs donepacer: assist ratio=, xrefs: 005062D7
    • VE, xrefs: 00506305
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: !"#$%%&&''((()))*++,,,,,------....//////0001123333333333444444444455666677777888888888889999999999::::::;;;;;;;;;;;;;;;;<<<<<<<<<<<<<<<<=====>>>>>>>>>>>??????????@@@@@@@@@@@@@@@@@@@@@@AAAAAAAAAAAAAAAAAAAAABBBBBBBBBBBCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC$malloc deadlockruntime error: with GC progscan missed a gmisaligned maskruntime: min = runtime: inUse=runtime: max = requested skip=bad panic stackrecovery failedstopm holding pstartm: m has ppreempt SPWRITEmissing mcache?ms: gomaxprocs=randinit missed]mo$malloc during signalclose of nil channelinconsistent lockedmnotetsleep not on g0bad system page size to unallocated span/gc/scan/stack:bytes/gc/scan/total:bytes/gc/heap/frees:bytes/gc/gomemlimit:bytesp mcache not flushed markroot jobs donepacer: assist ratio=$mallocgc called with gcphase == _GCmarkterminationruntime.Pinner: object was allocated into an arenaruntime.Pinner: decreased non-existing pin counterrecursive call during initialization - linker skewattempt to execute system stack code on user stackcompileCal$mallocgc called without a P or outside bootstrappingruntime.SetFinalizer: pointer not in allocated blockruntime: use of FixAlloc_Alloc before FixAlloc_Initspan set block with unpopped elements found in resetruntime: GetQueuedCompletionStatusEx failed (errno= $VE
    • API String ID: 0-780336222
    • Opcode ID: fdf15fa4ec168f304c831e202a25bda75bd3cad0d82d0d7222aa26bbe3a18604
    • Instruction ID: 866bc7a715d0b45d7464d5254648861d6890e49b7bff72d7ce3589c3ec62c1b5
    • Opcode Fuzzy Hash: fdf15fa4ec168f304c831e202a25bda75bd3cad0d82d0d7222aa26bbe3a18604
    • Instruction Fuzzy Hash: 1E320376308B8086DB20CB15E0447AFBF65F786B94F489626EF9903BD5DB38C895CB00
    Strings
    • findrunnable: wrong ppreempt at unknown pcreleasep: invalid argcheckdead: runnable gruntime: newstack at runtime: newstack sp=runtime: confused by pcHeader.textStart= timer data corruptionkey is not comparabledecompression failureunsupported extensionX25519Ky, xrefs: 004DFF0A
    • global runq empty with non-zero runqsizemust be able to track idle limiter eventruntime: SyscallN has too many argumentsgoroutine stack size is not a power of 2oversized record received with length %dtls: received empty certificates messagemalformed MIME heade, xrefs: 004DFEC6
    • findrunnable: negative nmspinningfreeing stack not in a stack spanstackalloc not on scheduler stackruntime: goroutine stack exceeds runtime: text offset out of rangetimer period must be non-negativeruntime: name offset out of rangeruntime: type offset out of r, xrefs: 004DFEF9
    • findrunnable: netpoll with spinningpidleput: P has non-empty run queuetraceback did not unwind completelyruntime: createevent failed; errno=unsupported signature algorithm: %vtls: too many non-advancing recordstls: server selected an invalid PSKtls: invalid Ky, xrefs: 004DFED7
    • findrunnable: netpoll with psave on system g not allowednewproc1: newg missing stacknewproc1: new g is not GdeadFixedStack is not power-of-2missing stack in shrinkstack args stack map entries for invalid runtime symbol tableruntime: no module data for [origina, xrefs: 004DFEE8
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: findrunnable: negative nmspinningfreeing stack not in a stack spanstackalloc not on scheduler stackruntime: goroutine stack exceeds runtime: text offset out of rangetimer period must be non-negativeruntime: name offset out of rangeruntime: type offset out of r$findrunnable: netpoll with psave on system g not allowednewproc1: newg missing stacknewproc1: new g is not GdeadFixedStack is not power-of-2missing stack in shrinkstack args stack map entries for invalid runtime symbol tableruntime: no module data for [origina$findrunnable: netpoll with spinningpidleput: P has non-empty run queuetraceback did not unwind completelyruntime: createevent failed; errno=unsupported signature algorithm: %vtls: too many non-advancing recordstls: server selected an invalid PSKtls: invalid Ky$findrunnable: wrong ppreempt at unknown pcreleasep: invalid argcheckdead: runnable gruntime: newstack at runtime: newstack sp=runtime: confused by pcHeader.textStart= timer data corruptionkey is not comparabledecompression failureunsupported extensionX25519Ky$global runq empty with non-zero runqsizemust be able to track idle limiter eventruntime: SyscallN has too many argumentsgoroutine stack size is not a power of 2oversized record received with length %dtls: received empty certificates messagemalformed MIME heade
    • API String ID: 0-2218324874
    • Opcode ID: c48492623a6c469abeac13ecebaa7da221e9c4cb667babfea0d9f82d79add055
    • Instruction ID: 99127ba33b0f5f1964e836125f83677992905666b94bfdb3edfeba6080c67d1e
    • Opcode Fuzzy Hash: c48492623a6c469abeac13ecebaa7da221e9c4cb667babfea0d9f82d79add055
    • Instruction Fuzzy Hash: 93928F32209BC485DB319B52E4903EBA361F78AB94F48413BCA8D57B55DF3DD889C744

    Control-flow Graph

    Strings
    • runtime: NtAssociateWaitCompletionPacket failed; errno= b4050a850c04b3abf54132565044b0b7d7bfd8ba270b39432355ffb4b70e0cbd6bb4bf7f321390b94a03c1d356c21122343280d6115c1d21bd376388b5f723fb4c22dfe6cd4375a05a07476444d5819985007e34x509: subject key identifier incorre, xrefs: 004D17C6
    • runtime: SetWaitableTimer failed; errno= stopTheWorld: not stopped (stopwait != 0)tls: internal error: unsupported key (%T)invalid value length: expected %d, got %dnet/url: invalid control character in URLidna: internal error in punycode encodingx509: cannot p, xrefs: 004D1829
    • runtime: NtCancelWaitCompletionPacket failed; errno= exited a goroutine internally locked to the OS threadcompileCallback: argument size is larger than uintptrtls: received unexpected handshake message of type %Ttls: unexpected server_name extension in server , xrefs: 004D186F
    • runtime: netpoll failedpanic during preemptoffnanotime returning zerofatal: morestack on g0the current g is not g0schedule: holding locksprocresize: invalid argspan has no free stacksstack growth after forkshrinkstack at bad timereflect.methodValueCallunsuppo, xrefs: 004D17EF, 004D184F, 004D1899
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: runtime: NtAssociateWaitCompletionPacket failed; errno= b4050a850c04b3abf54132565044b0b7d7bfd8ba270b39432355ffb4b70e0cbd6bb4bf7f321390b94a03c1d356c21122343280d6115c1d21bd376388b5f723fb4c22dfe6cd4375a05a07476444d5819985007e34x509: subject key identifier incorre$runtime: NtCancelWaitCompletionPacket failed; errno= exited a goroutine internally locked to the OS threadcompileCallback: argument size is larger than uintptrtls: received unexpected handshake message of type %Ttls: unexpected server_name extension in server $runtime: SetWaitableTimer failed; errno= stopTheWorld: not stopped (stopwait != 0)tls: internal error: unsupported key (%T)invalid value length: expected %d, got %dnet/url: invalid control character in URLidna: internal error in punycode encodingx509: cannot p$runtime: netpoll failedpanic during preemptoffnanotime returning zerofatal: morestack on g0the current g is not g0schedule: holding locksprocresize: invalid argspan has no free stacksstack growth after forkshrinkstack at bad timereflect.methodValueCallunsuppo
    • API String ID: 0-1393143707
    • Opcode ID: 2b01323e87d3f0d86477cb55004685455478adc560c03f9eac03ed2f638d6d61
    • Instruction ID: 9516022e667e312e37059f80f0a5cf0fafa0cc38cbf00445884b193d8d183ea7
    • Opcode Fuzzy Hash: 2b01323e87d3f0d86477cb55004685455478adc560c03f9eac03ed2f638d6d61
    • Instruction Fuzzy Hash: 97513E36608B8485D600DB66F49536EB764F78AB94F54822BFE9C43BAACF3CD441CB14
    Strings
    • runtime.preemptM: duplicatehandle failed; errno=runtime: malformed profBuf buffer - invalid sizeattempt to trace invalid or unsupported P statusruntime: waitforsingleobject wait_failed; errno=failed to parse certificate #%d in the chain: %wtls: no supported sy, xrefs: 004D4567
    • runtime.preemptM: duplicatehandle failedstopTheWorld: broken CPU time accountingglobal runq empty with non-zero runqsizemust be able to track idle limiter eventruntime: SyscallN has too many argumentsgoroutine stack size is not a power of 2oversized record rec, xrefs: 004D458F
    • self-preempt [recovered]bad recoverybad g statusentersyscallwirep: p->m=) p->status=releasep: m= sysmonwait= preemptoff=cas64 failed m->gsignal=-byte limitruntime: sp=abi mismatchwrong timerstlsunsafeekmclose notifyremote errorc hs traffics hs trafficc ap tra, xrefs: 004D45A5
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: runtime.preemptM: duplicatehandle failed; errno=runtime: malformed profBuf buffer - invalid sizeattempt to trace invalid or unsupported P statusruntime: waitforsingleobject wait_failed; errno=failed to parse certificate #%d in the chain: %wtls: no supported sy$runtime.preemptM: duplicatehandle failedstopTheWorld: broken CPU time accountingglobal runq empty with non-zero runqsizemust be able to track idle limiter eventruntime: SyscallN has too many argumentsgoroutine stack size is not a power of 2oversized record rec$self-preempt [recovered]bad recoverybad g statusentersyscallwirep: p->m=) p->status=releasep: m= sysmonwait= preemptoff=cas64 failed m->gsignal=-byte limitruntime: sp=abi mismatchwrong timerstlsunsafeekmclose notifyremote errorc hs traffics hs trafficc ap tra
    • API String ID: 0-4156812386
    • Opcode ID: bbb23f11ec5ba50f6d6531d8aa5a33ad43e03a8ebca891cb1f6c7597f587c8d4
    • Instruction ID: 559ff70a6be370a3bf3e65247ad321931aae0442a73103d3c9d2c274cdabc436
    • Opcode Fuzzy Hash: bbb23f11ec5ba50f6d6531d8aa5a33ad43e03a8ebca891cb1f6c7597f587c8d4
    • Instruction Fuzzy Hash: 27C14A36605B8086DA50DB25F89136F7760F78ABA4F1892379EAC93795DF3DC482CB04
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: @2P$PowerRegisterSuspendResumeNotification$powrprof.dll
    • API String ID: 0-4236600172
    • Opcode ID: b6923e269ffbd89576febc9603ee5a5ed6fbe6bad6538e105b42f951c6fac229
    • Instruction ID: 52e951b3f63b4051b6ef2790d71ad7e1078c9f8b9930dd149208cf681300ed1a
    • Opcode Fuzzy Hash: b6923e269ffbd89576febc9603ee5a5ed6fbe6bad6538e105b42f951c6fac229
    • Instruction Fuzzy Hash: 2C215536208B84C2DA00CB11F48535ABBA5F38ABC0F488116EE8C47B69DF7DD196CB40
    Strings
    • @IP, xrefs: 004C6AF3
    • grew heap, but no adequate free space foundroot level max pages doesn't fit in summaryruntime.Pinner: argument is not a pointer: runtime: releaseSudog with non-nil gp.paramunknown runnable goroutine during bootstrapruntime: casfrom_Gscanstatus bad oldval gp=ru, xrefs: 004C6D34
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: @IP$grew heap, but no adequate free space foundroot level max pages doesn't fit in summaryruntime.Pinner: argument is not a pointer: runtime: releaseSudog with non-nil gp.paramunknown runnable goroutine during bootstrapruntime: casfrom_Gscanstatus bad oldval gp=ru
    • API String ID: 0-3030388268
    • Opcode ID: c0e3a0be1c11d8b46b3095c4fa8e4cd62af39be93277936c475e0c0cff387c65
    • Instruction ID: 0fb67e18dfce37909f17762264c475df4894d16b72bf7d23250b8c1e228b55c0
    • Opcode Fuzzy Hash: c0e3a0be1c11d8b46b3095c4fa8e4cd62af39be93277936c475e0c0cff387c65
    • Instruction Fuzzy Hash: 0CE18F76309B8485DBA0CB16E480B9BBB61F786BD0F05912AEE8D43B69CF3CC455CB05
    Strings
    • span has no free objectsruntime: found obj at *(runtime: VirtualFree of /cgo/go-to-c-calls:calls/gc/heap/objects:objects/sched/latencies:secondsqueuefinalizer during GCupdate during transitionruntime: markroot index can't scan our own stackgcDrainN phase incor, xrefs: 004B39E4
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: span has no free objectsruntime: found obj at *(runtime: VirtualFree of /cgo/go-to-c-calls:calls/gc/heap/objects:objects/sched/latencies:secondsqueuefinalizer during GCupdate during transitionruntime: markroot index can't scan our own stackgcDrainN phase incor
    • API String ID: 0-1712010102
    • Opcode ID: ae2b4a60cd4b71864d7c834a084b747d49501bdee52085a22955735d566d6ddc
    • Instruction ID: 7f3bb0eeaedbfddc5f791b8ad99b80b3e6b84d89cecd0a97ca0f763cdaab8d9d
    • Opcode Fuzzy Hash: ae2b4a60cd4b71864d7c834a084b747d49501bdee52085a22955735d566d6ddc
    • Instruction Fuzzy Hash: E0B1CE72209A4186DF04DF26E4807AEB7A5F785B55F04452BEB8D03BAADF3CC945CB24
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: VL
    • API String ID: 0-2008703989
    • Opcode ID: 0285487a77ca8c429cb664d950a9f0151db0b7f51b401498925fabb90dc4b4b2
    • Instruction ID: f1face80dcf8a8936bd0e32852492341a2f71fd161cf62b973af693c478c67e5
    • Opcode Fuzzy Hash: 0285487a77ca8c429cb664d950a9f0151db0b7f51b401498925fabb90dc4b4b2
    • Instruction Fuzzy Hash: 4441C07A708B8591DB48DB2AE4913EA2761F385BC4F80913BEE4E47328DE3DD14AC340
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 279e71ce0faac639cd8fe2747d52f7bf2355e1466fec3e9460aad3adac2e8596
    • Instruction ID: 7849d8d88b4e4e5d6ec1890e4282c4bbf78e36c612a9a6d29cc92a43a2efc695
    • Opcode Fuzzy Hash: 279e71ce0faac639cd8fe2747d52f7bf2355e1466fec3e9460aad3adac2e8596
    • Instruction Fuzzy Hash: 78C18D72309B81C6DB00DF66F49036AB761F78A789F54512BEA8E8776ADB7CC441CB04
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 5f7a7e4e31a2d7b4741eaa636167f3a86c1949593231c24b7d210d352c23697a
    • Instruction ID: 70f00ae98ec0a28ab654cc79d9075fc6dd24321ec451b2e50776c7e580f3fe3f
    • Opcode Fuzzy Hash: 5f7a7e4e31a2d7b4741eaa636167f3a86c1949593231c24b7d210d352c23697a
    • Instruction Fuzzy Hash: 3F912575B41601CADB10BF16E8A036A7761F796B88F88917BD90C0B326DF3DD886C744
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: f217fb4e283cce5eec28e2320e7e1bd2ea3dd5fe5d6d15291f6e332b4f2ee163
    • Instruction ID: ab4d678b421df4d3483e4e88d5160f91b7b00f23e013916338777e0d46452ce5
    • Opcode Fuzzy Hash: f217fb4e283cce5eec28e2320e7e1bd2ea3dd5fe5d6d15291f6e332b4f2ee163
    • Instruction Fuzzy Hash: 0A213B32604B80C6D700EF62F95636A77A0F75AB94F449327E9AC423A6DF3CC081CB05
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID: CreateMutex
    • String ID:
    • API String ID: 1964310414-0
    • Opcode ID: 2525a88f381b6b1ecfbfb687c266decb66c4fc36e0a9b82aa819b4781aa7c3de
    • Instruction ID: ff9a7e31bb1c350d50ff0a1de2fdd5807b91f5766e6d777a61a199e3c1272586
    • Opcode Fuzzy Hash: 2525a88f381b6b1ecfbfb687c266decb66c4fc36e0a9b82aa819b4781aa7c3de
    • Instruction Fuzzy Hash: F3118C36640A8081EB259B1AE45136C6370F749BE4F244226DFAE53BA0CB39E5D3CA00
    Strings
    • failed to set sweep barrierwork.nwait was > work.nproc not in stack roots range [allocated pages below zero?address not a stack addressmspan.sweep: bad span stateinvalid profile bucket typeruntime: corrupted polldescruntime: netpollinit failedruntime: asyncPre, xrefs: 004B9189
    • MB goal, s.state = s.base()= heapGoal=GOMEMLIMIT KiB now, pages at sweepgen= sweepgen , bound = , limit = exitThreadBad varintGC forced runqueue= stopwait= runqsize= gfreecnt= throwing= spinning=atomicand8float64nanfloat32nanException ptrSize= targetpc=, xrefs: 004B8F45
    • @6P, xrefs: 004B8973
    • MB globals, work.nproc= work.nwait= nStackRoots= flushedWork double unlock s.spanclass= MB) workers=min too large-byte block (runtime: val=runtime: seq=fatal error: idlethreads= syscalltick=load64 failedxadd64 failedxchg64 failednil stackbase}sched={pc:, xrefs: 004B8F85
    • gc done but gcphase != _GCoffruntime: p.gcMarkWorkerMode= scanobject of a noscan objectruntime: marking free object addspecial on invalid pointerruntime: summary max pages = runtime: levelShift[level] = doRecordGoroutineProfile gp1=NtCreateWaitCompletionPacket, xrefs: 004B919A
    • `7P, xrefs: 004B90DF
    • ., xrefs: 004B8A7D
    • gcing MB, got= ... max=scav ptr ] = (usageinit ms, fault tab= top=[...], fp:tls: Earlyparsefilesimap2imap3imapspop3shostsutf-8%s*%dtext/bad nsse41sse42ssse3SHA-1P-224P-256P-384P-521ECDSA (at ClassStringFormat[]bytestringactiveclosedsocks5CANCELGOAWAYPADDED, xrefs: 004B8452
    • ms clock, nBSSRoots=runtime: P exp.) for minTrigger=GOMEMLIMIT=bad m value, elemsize= freeindex= span.list=, npages = p->status= in status idleprocs= gcwaiting= schedtick= timerslen= mallocing=bad timedivfloat64nan1float64nan2float64nan3float32nan2GOTRACE, xrefs: 004B8C8D
    • non-concurrent sweep failed to drain all sweep queuesruntime: NtCancelWaitCompletionPacket failed; errno= exited a goroutine internally locked to the OS threadcompileCallback: argument size is larger than uintptrtls: received unexpected handshake message of ty, xrefs: 004B9178
    • , xrefs: 004B896B
    • ms cpu, (forced) wbuf1.n= wbuf2.n= s.limit= s.state= B work ( B exp.) marked unmarked in use), size = bad prune, tail = recover: not in [ctxt != 0, oldval=, newval= threads=: status= blocked= lockedg=atomicor8 runtime= m->curg=(unknown)traceback} stack=, xrefs: 004B8EC5
    • gc %: gp *(in n= ) - P MPC= < end > ]:pc= Gkey///%25Viacgodnsudpftpssh::1set204206304400500..\\\.\\?\??adxaesshaavxfmanetMD4MD5RSADSAURIexp): TTLSET.exeopenreadtrueHost&lt;&gt;idlehttp1080DATAPINGPOSTEtag0x%xdateetagfromhostlinkvarypathDategz, xrefs: 004B8AFA
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: $ MB globals, work.nproc= work.nwait= nStackRoots= flushedWork double unlock s.spanclass= MB) workers=min too large-byte block (runtime: val=runtime: seq=fatal error: idlethreads= syscalltick=load64 failedxadd64 failedxchg64 failednil stackbase}sched={pc:$ MB goal, s.state = s.base()= heapGoal=GOMEMLIMIT KiB now, pages at sweepgen= sweepgen , bound = , limit = exitThreadBad varintGC forced runqueue= stopwait= runqsize= gfreecnt= throwing= spinning=atomicand8float64nanfloat32nanException ptrSize= targetpc=$ ms clock, nBSSRoots=runtime: P exp.) for minTrigger=GOMEMLIMIT=bad m value, elemsize= freeindex= span.list=, npages = p->status= in status idleprocs= gcwaiting= schedtick= timerslen= mallocing=bad timedivfloat64nan1float64nan2float64nan3float32nan2GOTRACE$ ms cpu, (forced) wbuf1.n= wbuf2.n= s.limit= s.state= B work ( B exp.) marked unmarked in use), size = bad prune, tail = recover: not in [ctxt != 0, oldval=, newval= threads=: status= blocked= lockedg=atomicor8 runtime= m->curg=(unknown)traceback} stack=$.$@6P$`7P$failed to set sweep barrierwork.nwait was > work.nproc not in stack roots range [allocated pages below zero?address not a stack addressmspan.sweep: bad span stateinvalid profile bucket typeruntime: corrupted polldescruntime: netpollinit failedruntime: asyncPre$gc %: gp *(in n= ) - P MPC= < end > ]:pc= Gkey///%25Viacgodnsudpftpssh::1set204206304400500..\\\.\\?\??adxaesshaavxfmanetMD4MD5RSADSAURIexp): TTLSET.exeopenreadtrueHost&lt;&gt;idlehttp1080DATAPINGPOSTEtag0x%xdateetagfromhostlinkvarypathDategz$gc done but gcphase != _GCoffruntime: p.gcMarkWorkerMode= scanobject of a noscan objectruntime: marking free object addspecial on invalid pointerruntime: summary max pages = runtime: levelShift[level] = doRecordGoroutineProfile gp1=NtCreateWaitCompletionPacket$gcing MB, got= ... max=scav ptr ] = (usageinit ms, fault tab= top=[...], fp:tls: Earlyparsefilesimap2imap3imapspop3shostsutf-8%s*%dtext/bad nsse41sse42ssse3SHA-1P-224P-256P-384P-521ECDSA (at ClassStringFormat[]bytestringactiveclosedsocks5CANCELGOAWAYPADDED$non-concurrent sweep failed to drain all sweep queuesruntime: NtCancelWaitCompletionPacket failed; errno= exited a goroutine internally locked to the OS threadcompileCallback: argument size is larger than uintptrtls: received unexpected handshake message of ty
    • API String ID: 0-973671051
    • Opcode ID: b5806f9b4e9994a24c0af5cc8925a3a12b09e6055781f034ae3b85ff486518c9
    • Instruction ID: 5ae836f392b7203daa1faa19439acd61957ac72a20e011d5382ebdfa9074e1d1
    • Opcode Fuzzy Hash: b5806f9b4e9994a24c0af5cc8925a3a12b09e6055781f034ae3b85ff486518c9
    • Instruction Fuzzy Hash: 24727D32609BC585EB21DB26F8953EA7768F78AB84F44812BDA8C43766DF3CC481C715
    Strings
    • , not a functiongc: unswept span KiB work (bg), mheap.sweepgen=runtime: nelems=workbuf is emptymSpanList.removemSpanList.insertbad special kindbad summary dataruntime: addr = runtime: base = runtime: head = timeBeginPeriod, xrefs: 004B6E90
    • runtime.SetFinalizer: pointer not at beginning of allocated blocktls: internal error: attempted to read record with QUIC transporttls: server selected an invalid version after a HelloRetryRequestx509: inner and outer signature algorithm identifiers don't match, xrefs: 004B6EB0
    • runtime.SetFinalizer: second argument is gcSweep being done but phase is not GCoffobjects added out of order or overlappingmheap.freeSpanLocked - invalid stack freemheap.freeSpanLocked - invalid span stateattempted to add zero-sized address rangeruntime: block, xrefs: 004B6E9F
    • runtime.SetFinalizer: first argument was allocated into an arenacompileCallback: expected function with one uintptr-sized resultattempted to trace stack of a goroutine this thread does not ownABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/ABCD, xrefs: 004B6F45
    • runtime.SetFinalizer: first argument is nilruntime.SetFinalizer: finalizer already setgcBgMarkWorker: unexpected gcMarkWorkerModenon in-use span found with specials bit setgrew heap, but no adequate free space foundroot level max pages doesn't fit in summaryru, xrefs: 004B6F97
    • runtime.SetFinalizer: cannot pass too many pages allocated in chunk?mspan.ensureSwept: m is not lockedruntime: source value is too largeVirtualQuery for stack base failedforEachP: sched.safePointWait != 0schedule: spinning with local workentersyscallblock inco, xrefs: 004B6DAC, 004B6E03, 004B6E6B
    • runtime.SetFinalizer: first argument is failed to acquire lock to reset capacitymarkWorkerStop: unknown mark worker modecannot free workbufs when work.full != 0runtime: out of memory: cannot allocate runtime.preemptM: duplicatehandle failedstopTheWorld: broken, xrefs: 004B6F86
    • nil elem type! to finalizer GC worker initruntime: full=runtime: want=MB; allocated RtlGetVersion, xrefs: 004B6F56
    • runtime.SetFinalizer: pointer not in allocated blockruntime: use of FixAlloc_Alloc before FixAlloc_Initspan set block with unpopped elements found in resetruntime: GetQueuedCompletionStatusEx failed (errno= runtime: NtCreateWaitCompletionPacket failed; errno=, xrefs: 004B6F34
    • ZkK, xrefs: 004B6B50
    • , not pointer != sweepgen MB globals, work.nproc= work.nwait= nStackRoots= flushedWork double unlock s.spanclass= MB) workers=min too large-byte block (runtime: val=runtime: seq=fatal error: idlethreads= syscalltick=load64 failedxadd64 failedxchg64 failed, xrefs: 004B6F77
    • because dotdotdotruntime: npages = invalid skip valueruntime: range = {index out of rangeruntime: gp: gp=runtime: getg: g=forEachP: not done in async preemptbad manualFreeListruntime: textAddr frames elided..., locked to threadruntime.semacreateruntime., xrefs: 004B6E30
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: because dotdotdotruntime: npages = invalid skip valueruntime: range = {index out of rangeruntime: gp: gp=runtime: getg: g=forEachP: not done in async preemptbad manualFreeListruntime: textAddr frames elided..., locked to threadruntime.semacreateruntime.$, not a functiongc: unswept span KiB work (bg), mheap.sweepgen=runtime: nelems=workbuf is emptymSpanList.removemSpanList.insertbad special kindbad summary dataruntime: addr = runtime: base = runtime: head = timeBeginPeriod$, not pointer != sweepgen MB globals, work.nproc= work.nwait= nStackRoots= flushedWork double unlock s.spanclass= MB) workers=min too large-byte block (runtime: val=runtime: seq=fatal error: idlethreads= syscalltick=load64 failedxadd64 failedxchg64 failed$ZkK$nil elem type! to finalizer GC worker initruntime: full=runtime: want=MB; allocated RtlGetVersion$runtime.SetFinalizer: cannot pass too many pages allocated in chunk?mspan.ensureSwept: m is not lockedruntime: source value is too largeVirtualQuery for stack base failedforEachP: sched.safePointWait != 0schedule: spinning with local workentersyscallblock inco$runtime.SetFinalizer: first argument is failed to acquire lock to reset capacitymarkWorkerStop: unknown mark worker modecannot free workbufs when work.full != 0runtime: out of memory: cannot allocate runtime.preemptM: duplicatehandle failedstopTheWorld: broken$runtime.SetFinalizer: first argument is nilruntime.SetFinalizer: finalizer already setgcBgMarkWorker: unexpected gcMarkWorkerModenon in-use span found with specials bit setgrew heap, but no adequate free space foundroot level max pages doesn't fit in summaryru$runtime.SetFinalizer: first argument was allocated into an arenacompileCallback: expected function with one uintptr-sized resultattempted to trace stack of a goroutine this thread does not ownABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/ABCD$runtime.SetFinalizer: pointer not at beginning of allocated blocktls: internal error: attempted to read record with QUIC transporttls: server selected an invalid version after a HelloRetryRequestx509: inner and outer signature algorithm identifiers don't match$runtime.SetFinalizer: pointer not in allocated blockruntime: use of FixAlloc_Alloc before FixAlloc_Initspan set block with unpopped elements found in resetruntime: GetQueuedCompletionStatusEx failed (errno= runtime: NtCreateWaitCompletionPacket failed; errno=$runtime.SetFinalizer: second argument is gcSweep being done but phase is not GCoffobjects added out of order or overlappingmheap.freeSpanLocked - invalid stack freemheap.freeSpanLocked - invalid span stateattempted to add zero-sized address rangeruntime: block
    • API String ID: 0-2982936295
    • Opcode ID: 5009f22eb0dec23a29e45bc7739795f5afe97b818addba64ab7740e842c1a2dc
    • Instruction ID: eed188602d58721b7c4c39ae2b80a5afd9e133681eee502df72fcc4b31a3ff49
    • Opcode Fuzzy Hash: 5009f22eb0dec23a29e45bc7739795f5afe97b818addba64ab7740e842c1a2dc
    • Instruction Fuzzy Hash: 97E19C32609B8485EB209B11E4803EEBBA5F785B80F4A8537DB8C57B99DF3CD495C724
    Strings
    • , i = code= addr= m->p= p->m=SCHED curg= ctxt: min= max= bad ts(...) m=nil base X25519%w%.0wAcceptServernetdnsdomaingophertelnetreturn.local.onionip+netCONIN$rdtscppopcntcmd/gosecretheaderAnswerLengthSTREETavx512rdrandrdseedGlobal\BooleanLayeredRoutingfloa, xrefs: 004CA485
    • runtime: summary[runtime: level = , p.searchAddr = RtlGetCurrentPeb, xrefs: 004C9EED, 004CA332
    • , levelBits[level] = runtime: searchIdx = defer on system stackpanic on system stackasync stack too largestartm: m is spinningstartlockedm: m has pfindrunnable: wrong ppreempt at unknown pcreleasep: invalid argcheckdead: runnable gruntime: newstack at runtime:, xrefs: 004CA505
    • , j0 = head = panic: nmsys= locks= dying= allocs m->g0= pad1= pad2= text= minpc= value= (scan)types : type nil keytls3desderivedInitialExpiresSubjectwindowswsarecvwsasendlookup writetocharsetCONOUT$\\.\UNCavx512fos/execruntimeSHA-224SHA-256SHA-384SHA-512E, xrefs: 004CA41A
    • ] = (usageinit ms, fault tab= top=[...], fp:tls: Earlyparsefilesimap2imap3imapspop3shostsutf-8%s*%dtext/bad nsse41sse42ssse3SHA-1P-224P-256P-384P-521ECDSA (at ClassStringFormat[]bytestringactiveclosedsocks5CANCELGOAWAYPADDEDBasic Cookieacceptcookieexpectorigi, xrefs: 004C9F26
    • bad summary dataruntime: addr = runtime: base = runtime: head = timeBeginPeriod, xrefs: 004C9FCF, 004CA72C
    • ] = pc=: p=cas1cas2cas3cas4cas5cas6 at m= sp= sp: lr: fp= gp= mp=) m=Fromicmpigmpftpspop3smtpdial unixxn--ermssse3avx2bmi1bmi2timebitsNameTypeasn1cx16sse2BjornErro:<nil>falseError&amp;&#34;&#39;https:***@Rangeallowrangeclose:path%s %q%s=%sHTTP/socksFound, xrefs: 004CA374
    • runtime: npages = invalid skip valueruntime: range = {index out of rangeruntime: gp: gp=runtime: getg: g=forEachP: not done in async preemptbad manualFreeListruntime: textAddr frames elided..., locked to threadruntime.semacreateruntime.semawakeupcontext., xrefs: 004C9FA5
    • runtime: p.searchAddr = range partially overlapsstack trace unavailablebindm in unexpected GOOSruntime: mp.lockedInt = runqsteal: runq overflowdouble traceGCSweepStartbad use of trace.seqlockerror decrypting messagecertificate unobtainabletls: server rejected, xrefs: 004CA465
    • , npages = p->status= in status idleprocs= gcwaiting= schedtick= timerslen= mallocing=bad timedivfloat64nan1float64nan2float64nan3float32nan2GOTRACEBACK) at entry+ (targetpc= , plugin: runtime: g : frame.sp=created by .WithCancel.WithValue(tls10servertls: al, xrefs: 004CA3FC
    • runtime: levelShift[level] = doRecordGoroutineProfile gp1=NtCreateWaitCompletionPacket, xrefs: 004CA4E5
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: , i = code= addr= m->p= p->m=SCHED curg= ctxt: min= max= bad ts(...) m=nil base X25519%w%.0wAcceptServernetdnsdomaingophertelnetreturn.local.onionip+netCONIN$rdtscppopcntcmd/gosecretheaderAnswerLengthSTREETavx512rdrandrdseedGlobal\BooleanLayeredRoutingfloa$, j0 = head = panic: nmsys= locks= dying= allocs m->g0= pad1= pad2= text= minpc= value= (scan)types : type nil keytls3desderivedInitialExpiresSubjectwindowswsarecvwsasendlookup writetocharsetCONOUT$\\.\UNCavx512fos/execruntimeSHA-224SHA-256SHA-384SHA-512E$, levelBits[level] = runtime: searchIdx = defer on system stackpanic on system stackasync stack too largestartm: m is spinningstartlockedm: m has pfindrunnable: wrong ppreempt at unknown pcreleasep: invalid argcheckdead: runnable gruntime: newstack at runtime:$, npages = p->status= in status idleprocs= gcwaiting= schedtick= timerslen= mallocing=bad timedivfloat64nan1float64nan2float64nan3float32nan2GOTRACEBACK) at entry+ (targetpc= , plugin: runtime: g : frame.sp=created by .WithCancel.WithValue(tls10servertls: al$] = pc=: p=cas1cas2cas3cas4cas5cas6 at m= sp= sp: lr: fp= gp= mp=) m=Fromicmpigmpftpspop3smtpdial unixxn--ermssse3avx2bmi1bmi2timebitsNameTypeasn1cx16sse2BjornErro:<nil>falseError&amp;&#34;&#39;https:***@Rangeallowrangeclose:path%s %q%s=%sHTTP/socksFound$] = (usageinit ms, fault tab= top=[...], fp:tls: Earlyparsefilesimap2imap3imapspop3shostsutf-8%s*%dtext/bad nsse41sse42ssse3SHA-1P-224P-256P-384P-521ECDSA (at ClassStringFormat[]bytestringactiveclosedsocks5CANCELGOAWAYPADDEDBasic Cookieacceptcookieexpectorigi$bad summary dataruntime: addr = runtime: base = runtime: head = timeBeginPeriod$runtime: levelShift[level] = doRecordGoroutineProfile gp1=NtCreateWaitCompletionPacket$runtime: npages = invalid skip valueruntime: range = {index out of rangeruntime: gp: gp=runtime: getg: g=forEachP: not done in async preemptbad manualFreeListruntime: textAddr frames elided..., locked to threadruntime.semacreateruntime.semawakeupcontext.$runtime: p.searchAddr = range partially overlapsstack trace unavailablebindm in unexpected GOOSruntime: mp.lockedInt = runqsteal: runq overflowdouble traceGCSweepStartbad use of trace.seqlockerror decrypting messagecertificate unobtainabletls: server rejected$runtime: summary[runtime: level = , p.searchAddr = RtlGetCurrentPeb
    • API String ID: 0-1267405085
    • Opcode ID: 51472d7f3d3df06c9a69e67d1da9d023492f22ec393334fa902a94a7c7fc8c49
    • Instruction ID: b23eb45eab3907f2cc24245a72fc870d5fafbf190126bd737e057f0217c2f31e
    • Opcode Fuzzy Hash: 51472d7f3d3df06c9a69e67d1da9d023492f22ec393334fa902a94a7c7fc8c49
    • Instruction Fuzzy Hash: 9932DE7A714BC981EB609B12E8507EAA325F789BC4F40412BDE8D07B5ACF3CC855C705
    Strings
    • and defersweeptestRtestWexecWhchanexecRschedsudogtimergscanmheaptracepanicsleep cnt=gcing MB, got= ... max=scav ptr ] = (usageinit ms, fault tab= top=[...], fp:tls: Earlyparsefilesimap2imap3imapspop3shostsutf-8%s*%dtext/bad nsse41sse42ssse3SHA-1P-224P-256, xrefs: 004F08EF, 004F0A7A
    • missing stackmapbad symbol tablenon-Go function not in ranges:context canceledno renegotiationSignatureScheme(Content-LanguagehostLookupOrder=/etc/resolv.confnon-IPv4 addressnon-IPv6 addressunknown network no colon on lineinvalid encodingGetCurrentThreadRtlV, xrefs: 004F0A19, 004F0B99
    • runtime: pcdata is bad ABI descriptionrevoked certificateexpired certificateunknown certificateunknown cipher typeinvalid URL escape missing ']' in hostmultipartmaxheaderscriterion too shortmime: no media typeevictCount overflowbad file descriptordisk quota ex, xrefs: 004F08D3, 004F0A5F
    • bad symbol tablenon-Go function not in ranges:context canceledno renegotiationSignatureScheme(Content-LanguagehostLookupOrder=/etc/resolv.confnon-IPv4 addressnon-IPv6 addressunknown network no colon on lineinvalid encodingGetCurrentThreadRtlVirtualUnwindinva, xrefs: 004F096A, 004F0AEA
    • untyped args out of range no module data in goroutine runtime: seq1=runtime: goid=.WithoutCancel.WithDeadline(bad record MACAccept-CharsetDkim-Signatureunknown mode: need more dataREQUEST_METHODfile too largelevel 2 haltedlevel 3 haltedtoo many linksno such , xrefs: 004F09D7
    • untyped locals missing stackmapbad symbol tablenon-Go function not in ranges:context canceledno renegotiationSignatureScheme(Content-LanguagehostLookupOrder=/etc/resolv.confnon-IPv4 addressnon-IPv6 addressunknown network no colon on lineinvalid encodingGetC, xrefs: 004F0B4C
    • args stack map entries for invalid runtime symbol tableruntime: no module data for [originating from goroutine traceRegion: alloc too largetls: malformed ECHConfigListEd25519 verification failuremalformed MIME header line: cannot unmarshal DNS messageinvalid , xrefs: 004F090F
    • (targetpc= , plugin: runtime: g : frame.sp=created by .WithCancel.WithValue(tls10servertls: alert(local errorc e traffictraffic updIn-Reply-ToReturn-Pathsubmissionsi/o timeoutHTTPS_PROXYhttps_proxyProcessPrngNetShareAddNetShareDelbad messagefile existsbad add, xrefs: 004F0937, 004F0AB8
    • locals stack map entries for abi mismatch detected between runtime: impossible type kind unsafe.Slice: len out of rangeprotocol version not supportedmissing validateFirstLine funcmime: duplicate parameter namesocket operation on non-socketinappropriate ioctl , xrefs: 004F0A95
    • runtime: frame ts set in timertraceback stuckx509keypairleafrecord overflowbad certificatePKCS1WithSHA256PKCS1WithSHA384PKCS1WithSHA512ClientAuthType(unknown versionAccept-LanguageX-Forwarded-Formissing address/etc/mdns.allowunknown network()<>@,;:\"/[]?=adver, xrefs: 004F09B4, 004F0B29
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: (targetpc= , plugin: runtime: g : frame.sp=created by .WithCancel.WithValue(tls10servertls: alert(local errorc e traffictraffic updIn-Reply-ToReturn-Pathsubmissionsi/o timeoutHTTPS_PROXYhttps_proxyProcessPrngNetShareAddNetShareDelbad messagefile existsbad add$ and defersweeptestRtestWexecWhchanexecRschedsudogtimergscanmheaptracepanicsleep cnt=gcing MB, got= ... max=scav ptr ] = (usageinit ms, fault tab= top=[...], fp:tls: Earlyparsefilesimap2imap3imapspop3shostsutf-8%s*%dtext/bad nsse41sse42ssse3SHA-1P-224P-256$ args stack map entries for invalid runtime symbol tableruntime: no module data for [originating from goroutine traceRegion: alloc too largetls: malformed ECHConfigListEd25519 verification failuremalformed MIME header line: cannot unmarshal DNS messageinvalid $ locals stack map entries for abi mismatch detected between runtime: impossible type kind unsafe.Slice: len out of rangeprotocol version not supportedmissing validateFirstLine funcmime: duplicate parameter namesocket operation on non-socketinappropriate ioctl $ untyped args out of range no module data in goroutine runtime: seq1=runtime: goid=.WithoutCancel.WithDeadline(bad record MACAccept-CharsetDkim-Signatureunknown mode: need more dataREQUEST_METHODfile too largelevel 2 haltedlevel 3 haltedtoo many linksno such $ untyped locals missing stackmapbad symbol tablenon-Go function not in ranges:context canceledno renegotiationSignatureScheme(Content-LanguagehostLookupOrder=/etc/resolv.confnon-IPv4 addressnon-IPv6 addressunknown network no colon on lineinvalid encodingGetC$bad symbol tablenon-Go function not in ranges:context canceledno renegotiationSignatureScheme(Content-LanguagehostLookupOrder=/etc/resolv.confnon-IPv4 addressnon-IPv6 addressunknown network no colon on lineinvalid encodingGetCurrentThreadRtlVirtualUnwindinva$missing stackmapbad symbol tablenon-Go function not in ranges:context canceledno renegotiationSignatureScheme(Content-LanguagehostLookupOrder=/etc/resolv.confnon-IPv4 addressnon-IPv6 addressunknown network no colon on lineinvalid encodingGetCurrentThreadRtlV$runtime: frame ts set in timertraceback stuckx509keypairleafrecord overflowbad certificatePKCS1WithSHA256PKCS1WithSHA384PKCS1WithSHA512ClientAuthType(unknown versionAccept-LanguageX-Forwarded-Formissing address/etc/mdns.allowunknown network()<>@,;:\"/[]?=adver$runtime: pcdata is bad ABI descriptionrevoked certificateexpired certificateunknown certificateunknown cipher typeinvalid URL escape missing ']' in hostmultipartmaxheaderscriterion too shortmime: no media typeevictCount overflowbad file descriptordisk quota ex
    • API String ID: 0-1331516954
    • Opcode ID: 0e86ae5192ea07c8eb8d3e850914533c54211671846e635f39f187d4b9c3397e
    • Instruction ID: ee48c65dfdb48b38df26ae6561e23e993341c18653ef5a0b9e166567c2596623
    • Opcode Fuzzy Hash: 0e86ae5192ea07c8eb8d3e850914533c54211671846e635f39f187d4b9c3397e
    • Instruction Fuzzy Hash: 41E1A336608B8985EB20EB26E49036EB365F788B84F54412BEF8D47766DF7CC944CB04
    Strings
    • sweep: tried to preserve a user arena spanruntime: blocked write on closing polldescacquireSudog: found s.elem != nil in cachefatal error: cgo callback before cgo callon a locked thread with no template threadunexpected signal during runtime executiontraceSto, xrefs: 004C3B1E
    • sweepgen= sweepgen , bound = , limit = exitThreadBad varintGC forced runqueue= stopwait= runqsize= gfreecnt= throwing= spinning=atomicand8float64nanfloat32nanException ptrSize= targetpc= until pc=unknown pcruntime: ggoroutine res binderres masterresumption, xrefs: 004C3B75
    • nalloc= nfreed=[signal newval= mcount= bytes, stack=[ minLC= maxpc= stack=[ minutes status= etypes tlskyberCurveID(finishedexporterReceivednetedns0[::1]:53continue_gatewayinvalid address readfromwsaioctlunixgramif-rangeNO_PROXYno_proxyno anodeavx512bwavx5, xrefs: 004C3C08
    • previous allocCount=, levelBits[level] = runtime: searchIdx = defer on system stackpanic on system stackasync stack too largestartm: m is spinningstartlockedm: m has pfindrunnable: wrong ppreempt at unknown pcreleasep: invalid argcheckdead: runnable gruntime:, xrefs: 004C3C25
    • sweep increased allocation countremovespecial on invalid pointergetWeakHandle on invalid pointerruntime: root level max pages = NtAssociateWaitCompletionPacket, xrefs: 004C3C6F
    • swept cached spanmarkBits overflowruntime: summary[runtime: level = , p.searchAddr = RtlGetCurrentPeb, xrefs: 004C3B2F
    • mspan.sweep: bad span state after sweepruntime: blocked write on free polldescPowerRegisterSuspendResumeNotification, xrefs: 004C3BB8
    • mheap.sweepgen=runtime: nelems=workbuf is emptymSpanList.removemSpanList.insertbad special kindbad summary dataruntime: addr = runtime: base = runtime: head = timeBeginPeriod, xrefs: 004C3B90
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: mheap.sweepgen=runtime: nelems=workbuf is emptymSpanList.removemSpanList.insertbad special kindbad summary dataruntime: addr = runtime: base = runtime: head = timeBeginPeriod$ nalloc= nfreed=[signal newval= mcount= bytes, stack=[ minLC= maxpc= stack=[ minutes status= etypes tlskyberCurveID(finishedexporterReceivednetedns0[::1]:53continue_gatewayinvalid address readfromwsaioctlunixgramif-rangeNO_PROXYno_proxyno anodeavx512bwavx5$ previous allocCount=, levelBits[level] = runtime: searchIdx = defer on system stackpanic on system stackasync stack too largestartm: m is spinningstartlockedm: m has pfindrunnable: wrong ppreempt at unknown pcreleasep: invalid argcheckdead: runnable gruntime:$ sweepgen= sweepgen , bound = , limit = exitThreadBad varintGC forced runqueue= stopwait= runqsize= gfreecnt= throwing= spinning=atomicand8float64nanfloat32nanException ptrSize= targetpc= until pc=unknown pcruntime: ggoroutine res binderres masterresumption$mspan.sweep: bad span state after sweepruntime: blocked write on free polldescPowerRegisterSuspendResumeNotification$sweep increased allocation countremovespecial on invalid pointergetWeakHandle on invalid pointerruntime: root level max pages = NtAssociateWaitCompletionPacket$sweep: tried to preserve a user arena spanruntime: blocked write on closing polldescacquireSudog: found s.elem != nil in cachefatal error: cgo callback before cgo callon a locked thread with no template threadunexpected signal during runtime executiontraceSto$swept cached spanmarkBits overflowruntime: summary[runtime: level = , p.searchAddr = RtlGetCurrentPeb
    • API String ID: 0-171345729
    • Opcode ID: f910813209429a19f44956c5a126f7a649c12e5a76eb5f4d603335f469ef5ebe
    • Instruction ID: 2f9ad473a9ec8c7ee616a52e762488fbc706077941274aba3a31bf17380483b7
    • Opcode Fuzzy Hash: f910813209429a19f44956c5a126f7a649c12e5a76eb5f4d603335f469ef5ebe
    • Instruction Fuzzy Hash: E2F1EF77208B8182DB50DF25E4903AE7761F78AB84F84812BEA8D43769DF3CC996C754
    Strings
    • runtime: gp: gp=runtime: getg: g=forEachP: not done in async preemptbad manualFreeListruntime: textAddr frames elided..., locked to threadruntime.semacreateruntime.semawakeupcontext.Backgroundunexpected messageexport restrictioninvalid character server m, xrefs: 004D8005
    • , gp->atomicstatus=marking free object KiB work (eager), [controller reset]mspan.sweep: state=sysMemStat overflowbad sequence numberntdll.dll not foundwinmm.dll not foundruntime: g0 stack [panic during mallocpanic holding locksmissing deferreturnunexpected gp, xrefs: 004D8045
    • invalid g statuscastogscanstatusbad g transitionschedule: in cgoreflect mismatch untyped locals missing stackmapbad symbol tablenon-Go function not in ranges:context canceledno renegotiationSignatureScheme(Content-LanguagehostLookupOrder=/etc/resolv.confnon-, xrefs: 004D80F9
    • , goid= s=nil (scan MB in pacer: % CPU ( zombie, j0 = head = panic: nmsys= locks= dying= allocs m->g0= pad1= pad2= text= minpc= value= (scan)types : type nil keytls3desderivedInitialExpiresSubjectwindowswsarecvwsasendlookup writetocharsetCONOUT$\\.\UNCa, xrefs: 004D8025, 004D80AF
    • JP, xrefs: 004D7F5B
    • suspendG from non-preemptible goroutineruntime: casfrom_Gscanstatus failed gp=stack growth not allowed in system calltraceback: unexpected SPWRITE function traceRegion: alloc with concurrent droptls: unsupported certificate curve (%s)tls: internal error: wrong, xrefs: 004D810A
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: , goid= s=nil (scan MB in pacer: % CPU ( zombie, j0 = head = panic: nmsys= locks= dying= allocs m->g0= pad1= pad2= text= minpc= value= (scan)types : type nil keytls3desderivedInitialExpiresSubjectwindowswsarecvwsasendlookup writetocharsetCONOUT$\\.\UNCa$, gp->atomicstatus=marking free object KiB work (eager), [controller reset]mspan.sweep: state=sysMemStat overflowbad sequence numberntdll.dll not foundwinmm.dll not foundruntime: g0 stack [panic during mallocpanic holding locksmissing deferreturnunexpected gp$invalid g statuscastogscanstatusbad g transitionschedule: in cgoreflect mismatch untyped locals missing stackmapbad symbol tablenon-Go function not in ranges:context canceledno renegotiationSignatureScheme(Content-LanguagehostLookupOrder=/etc/resolv.confnon-$runtime: gp: gp=runtime: getg: g=forEachP: not done in async preemptbad manualFreeListruntime: textAddr frames elided..., locked to threadruntime.semacreateruntime.semawakeupcontext.Backgroundunexpected messageexport restrictioninvalid character server m$suspendG from non-preemptible goroutineruntime: casfrom_Gscanstatus failed gp=stack growth not allowed in system calltraceback: unexpected SPWRITE function traceRegion: alloc with concurrent droptls: unsupported certificate curve (%s)tls: internal error: wrong$JP
    • API String ID: 0-178645164
    • Opcode ID: 8ea98e8fad8518d996c762b701742b963005bc78c5531d52c48de25392c58038
    • Instruction ID: fa756ae87a75b7292614339f4898bfcaf828eedf6ec2018b6beae8c435b19599
    • Opcode Fuzzy Hash: 8ea98e8fad8518d996c762b701742b963005bc78c5531d52c48de25392c58038
    • Instruction Fuzzy Hash: FCD17D36608B8086D710DB26E06176ABB61F78ABD0F14916BEE8D03B69DB3CC841CB05
    Strings
    • fp= gp= mp=) m=Fromicmpigmpftpspop3smtpdial unixxn--ermssse3avx2bmi1bmi2timebitsNameTypeasn1cx16sse2BjornErro:<nil>falseError&amp;&#34;&#39;https:***@Rangeallowrangeclose:path%s %q%s=%sHTTP/socksFoundchdirwritemkdirLstatMarchApril+0530+0430+0545+0630+0330+, xrefs: 004F9AB2
    • ...0,h1NUL:\/SunMonTueWedThuFriSatJanFebMarAprMayJunJulAugSepOctNovDecUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08IDT+12PKT+11KST+05JST+10-01-11-12-08-09+13CETBSTMSK-06+14 m=StdDlt125625NaNintmapptr, xrefs: 004F98F7
    • sp= sp: lr: fp= gp= mp=) m=Fromicmpigmpftpspop3smtpdial unixxn--ermssse3avx2bmi1bmi2timebitsNameTypeasn1cx16sse2BjornErro:<nil>falseError&amp;&#34;&#39;https:***@Rangeallowrangeclose:path%s %q%s=%sHTTP/socksFoundchdirwritemkdirLstatMarchApril+0530+0430+054, xrefs: 004F9AD2
    • pc=: p=cas1cas2cas3cas4cas5cas6 at m= sp= sp: lr: fp= gp= mp=) m=Fromicmpigmpftpspop3smtpdial unixxn--ermssse3avx2bmi1bmi2timebitsNameTypeasn1cx16sse2BjornErro:<nil>falseError&amp;&#34;&#39;https:***@Rangeallowrangeclose:path%s %q%s=%sHTTP/socksFoundchdi, xrefs: 004F9AF2
    • non-Go function at pc=error decoding messageinappropriate fallbackECDSAWithP256AndSHA256ECDSAWithP384AndSHA384ECDSAWithP521AndSHA512.localhost.localdomainmissing ']' in addressinvalid address familyoperation was canceledgzip: invalid checksumhpack: string too , xrefs: 004F9C1B
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: fp= gp= mp=) m=Fromicmpigmpftpspop3smtpdial unixxn--ermssse3avx2bmi1bmi2timebitsNameTypeasn1cx16sse2BjornErro:<nil>falseError&amp;&#34;&#39;https:***@Rangeallowrangeclose:path%s %q%s=%sHTTP/socksFoundchdirwritemkdirLstatMarchApril+0530+0430+0545+0630+0330+$ pc=: p=cas1cas2cas3cas4cas5cas6 at m= sp= sp: lr: fp= gp= mp=) m=Fromicmpigmpftpspop3smtpdial unixxn--ermssse3avx2bmi1bmi2timebitsNameTypeasn1cx16sse2BjornErro:<nil>falseError&amp;&#34;&#39;https:***@Rangeallowrangeclose:path%s %q%s=%sHTTP/socksFoundchdi$ sp= sp: lr: fp= gp= mp=) m=Fromicmpigmpftpspop3smtpdial unixxn--ermssse3avx2bmi1bmi2timebitsNameTypeasn1cx16sse2BjornErro:<nil>falseError&amp;&#34;&#39;https:***@Rangeallowrangeclose:path%s %q%s=%sHTTP/socksFoundchdirwritemkdirLstatMarchApril+0530+0430+054$...0,h1NUL:\/SunMonTueWedThuFriSatJanFebMarAprMayJunJulAugSepOctNovDecUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08IDT+12PKT+11KST+05JST+10-01-11-12-08-09+13CETBSTMSK-06+14 m=StdDlt125625NaNintmapptr$non-Go function at pc=error decoding messageinappropriate fallbackECDSAWithP256AndSHA256ECDSAWithP384AndSHA384ECDSAWithP521AndSHA512.localhost.localdomainmissing ']' in addressinvalid address familyoperation was canceledgzip: invalid checksumhpack: string too
    • API String ID: 0-1084136232
    • Opcode ID: 6ebea664f7ef505be44b84a1a3ad0100ca32ff607a4c2ffbf4933beddfb6e13f
    • Instruction ID: 4c36211be710d76a8080f22b06969625e7021ab83c5fd426308f34a199179465
    • Opcode Fuzzy Hash: 6ebea664f7ef505be44b84a1a3ad0100ca32ff607a4c2ffbf4933beddfb6e13f
    • Instruction Fuzzy Hash: B1123532219BC885DB609B26E4943AFB7A4F789B84F44511AEF8D43B69CF3DC845CB04
    Strings
    • != sweepgen MB globals, work.nproc= work.nwait= nStackRoots= flushedWork double unlock s.spanclass= MB) workers=min too large-byte block (runtime: val=runtime: seq=fatal error: idlethreads= syscalltick=load64 failedxadd64 failedxchg64 failednil stackbase, xrefs: 004B7C85
    • runtime: p ms clock, nBSSRoots=runtime: P exp.) for minTrigger=GOMEMLIMIT=bad m value, elemsize= freeindex= span.list=, npages = p->status= in status idleprocs= gcwaiting= schedtick= timerslen= mallocing=bad timedivfloat64nan1float64nan2float64nan3float32, xrefs: 004B7C4C
    • flushGen MB goal, s.state = s.base()= heapGoal=GOMEMLIMIT KiB now, pages at sweepgen= sweepgen , bound = , limit = exitThreadBad varintGC forced runqueue= stopwait= runqsize= gfreecnt= throwing= spinning=atomicand8float64nanfloat32nanException ptrSize= , xrefs: 004B7C67
    • p mcache not flushed markroot jobs donepacer: assist ratio=workbuf is not emptybad use of bucket.mpbad use of bucket.bpruntime: double waitpreempt off reason: forcegc: phase errorgopark: bad g statusgo of nil func valueselectgo: bad wakeupsemaRoot rotateRight, xrefs: 004B7CAA
    • 8P, xrefs: 004B7A1C
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: != sweepgen MB globals, work.nproc= work.nwait= nStackRoots= flushedWork double unlock s.spanclass= MB) workers=min too large-byte block (runtime: val=runtime: seq=fatal error: idlethreads= syscalltick=load64 failedxadd64 failedxchg64 failednil stackbase$ 8P$ flushGen MB goal, s.state = s.base()= heapGoal=GOMEMLIMIT KiB now, pages at sweepgen= sweepgen , bound = , limit = exitThreadBad varintGC forced runqueue= stopwait= runqsize= gfreecnt= throwing= spinning=atomicand8float64nanfloat32nanException ptrSize= $p mcache not flushed markroot jobs donepacer: assist ratio=workbuf is not emptybad use of bucket.mpbad use of bucket.bpruntime: double waitpreempt off reason: forcegc: phase errorgopark: bad g statusgo of nil func valueselectgo: bad wakeupsemaRoot rotateRight$runtime: p ms clock, nBSSRoots=runtime: P exp.) for minTrigger=GOMEMLIMIT=bad m value, elemsize= freeindex= span.list=, npages = p->status= in status idleprocs= gcwaiting= schedtick= timerslen= mallocing=bad timedivfloat64nan1float64nan2float64nan3float32
    • API String ID: 0-4176609771
    • Opcode ID: 897ae49ce3a99e86bd1ba1eddaf4ea1f8f1d05f6eb5648d7d91fc0c0d7b6d805
    • Instruction ID: fc739e1e69f1f5a141d612686087277f54ebbcbce467b1c07397c8118fe8eb7d
    • Opcode Fuzzy Hash: 897ae49ce3a99e86bd1ba1eddaf4ea1f8f1d05f6eb5648d7d91fc0c0d7b6d805
    • Instruction Fuzzy Hash: 1DF1D332209B808AEB10DF25F4843AE7765F786794F44822BDA9D437A6DF3CC491CB55
    Strings
    • base of ) = <==GOGC] = pc=: p=cas1cas2cas3cas4cas5cas6 at m= sp= sp: lr: fp= gp= mp=) m=Fromicmpigmpftpspop3smtpdial unixxn--ermssse3avx2bmi1bmi2timebitsNameTypeasn1cx16sse2BjornErro:<nil>falseError&amp;&#34;&#39;https:***@Rangeallowrangeclose:path%s %q, xrefs: 004BE1FB
    • greyobject: obj not pointer-alignedmismatched begin/end of activeSweepmheap.freeSpanLocked - invalid freefailed to get or create weak handleattempt to clear non-empty span setruntime: close polldesc w/o unblockruntime: inconsistent read deadlineNtCreateWaitCom, xrefs: 004BE24F
    • marking free object KiB work (eager), [controller reset]mspan.sweep: state=sysMemStat overflowbad sequence numberntdll.dll not foundwinmm.dll not foundruntime: g0 stack [panic during mallocpanic holding locksmissing deferreturnunexpected gp.parampanic during , xrefs: 004BE23E
    • runtime: marking free object addspecial on invalid pointerruntime: summary max pages = runtime: levelShift[level] = doRecordGoroutineProfile gp1=NtCreateWaitCompletionPacket, xrefs: 004BE187
    • objgc %: gp *(in n= ) - P MPC= < end > ]:pc= Gkey///%25Viacgodnsudpftpssh::1set204206304400500..\\\.\\?\??adxaesshaavxfmanetMD4MD5RSADSAURIexp): TTLSET.exeopenreadtrueHost&lt;&gt;idlehttp1080DATAPINGPOSTEtag0x%xdateetagfromhostlinkvarypathDat, xrefs: 004BE216
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: base of ) = <==GOGC] = pc=: p=cas1cas2cas3cas4cas5cas6 at m= sp= sp: lr: fp= gp= mp=) m=Fromicmpigmpftpspop3smtpdial unixxn--ermssse3avx2bmi1bmi2timebitsNameTypeasn1cx16sse2BjornErro:<nil>falseError&amp;&#34;&#39;https:***@Rangeallowrangeclose:path%s %q$greyobject: obj not pointer-alignedmismatched begin/end of activeSweepmheap.freeSpanLocked - invalid freefailed to get or create weak handleattempt to clear non-empty span setruntime: close polldesc w/o unblockruntime: inconsistent read deadlineNtCreateWaitCom$marking free object KiB work (eager), [controller reset]mspan.sweep: state=sysMemStat overflowbad sequence numberntdll.dll not foundwinmm.dll not foundruntime: g0 stack [panic during mallocpanic holding locksmissing deferreturnunexpected gp.parampanic during $objgc %: gp *(in n= ) - P MPC= < end > ]:pc= Gkey///%25Viacgodnsudpftpssh::1set204206304400500..\\\.\\?\??adxaesshaavxfmanetMD4MD5RSADSAURIexp): TTLSET.exeopenreadtrueHost&lt;&gt;idlehttp1080DATAPINGPOSTEtag0x%xdateetagfromhostlinkvarypathDat$runtime: marking free object addspecial on invalid pointerruntime: summary max pages = runtime: levelShift[level] = doRecordGoroutineProfile gp1=NtCreateWaitCompletionPacket
    • API String ID: 0-1638293046
    • Opcode ID: a31ce7c56f6451832368dddaaeddf1ccf0a0bc67d43242c260fd0a0fba6cae95
    • Instruction ID: ddc0528076e17acf151039b571e2b081633f25c1675f77fc19543a22840aeb6a
    • Opcode Fuzzy Hash: a31ce7c56f6451832368dddaaeddf1ccf0a0bc67d43242c260fd0a0fba6cae95
    • Instruction Fuzzy Hash: 5861CF72608B8186EB109B16E4403EEBB79F786B84F44512AEF8D07B66CB7CC5A4C714
    Strings
    • invalid pattern syntax: x509: malformed validityaddress string too shortresource length too longunpacking Question.ClassstreamSafe was not resetGODEBUG sys/cpu: value "", required CPU featurechacha20: wrong key sizezip: not a valid zip filehttp: invalid cooki, xrefs: 0054385B, 00543917, 005439C2, 00543E4A, 00543F19, 00543F80, 00543FEA, 00544052
    • -, xrefs: 00543A7D
    • pattern bits too long: exit hook invoked panicinvalid PrintableStringx509: malformed UTCTimex509: invalid key usagex509: malformed versiontoo many pointers (>10)segment length too longunpacking Question.Nameunpacking Question.Typeskipping Question ClassP224 po, xrefs: 00543EB2
    • invalid pattern syntax (+ after -): no assembly implementation availablex509: zero or negative DSA parameterx509: invalid CRL distribution pointx509: invalid subject key identifierx509: malformed algorithm identifiercrypto/cipher: input not full blockscrypto/s, xrefs: 00543DE3
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: -$invalid pattern syntax (+ after -): no assembly implementation availablex509: zero or negative DSA parameterx509: invalid CRL distribution pointx509: invalid subject key identifierx509: malformed algorithm identifiercrypto/cipher: input not full blockscrypto/s$invalid pattern syntax: x509: malformed validityaddress string too shortresource length too longunpacking Question.ClassstreamSafe was not resetGODEBUG sys/cpu: value "", required CPU featurechacha20: wrong key sizezip: not a valid zip filehttp: invalid cooki$pattern bits too long: exit hook invoked panicinvalid PrintableStringx509: malformed UTCTimex509: invalid key usagex509: malformed versiontoo many pointers (>10)segment length too longunpacking Question.Nameunpacking Question.Typeskipping Question ClassP224 po
    • API String ID: 0-3891606564
    • Opcode ID: 76792ac96d893af3fbb5cb37ac0fff523b7c522003e0f9cd9b4052cb43a2a454
    • Instruction ID: 65d5b9751fc1b0a7574a5f59a0a921286f47c3e9fa4f326e57ff6a48d00013b3
    • Opcode Fuzzy Hash: 76792ac96d893af3fbb5cb37ac0fff523b7c522003e0f9cd9b4052cb43a2a454
    • Instruction Fuzzy Hash: 1032D132A08B80C4D711CF25E8443DA7BA4F785BA8F589226DBAD477A5DF7DCA94C700
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: 2-by$expa$nd 3$te k
    • API String ID: 0-3581043453
    • Opcode ID: d0a0678b136faf6cdae2b5bb443573c909990b14ac4f0b67f8b4f134291ae36c
    • Instruction ID: 5a507d22028e55e31b090cfd7012f2dd07ab1ff66a69ee0c8e32482875761174
    • Opcode Fuzzy Hash: d0a0678b136faf6cdae2b5bb443573c909990b14ac4f0b67f8b4f134291ae36c
    • Instruction Fuzzy Hash: EDB1B066F25FD94AF323A63810036B7EB185FFB9C9A40E327FC9474A87D72095036254
    Strings
    • stopTheWorld: not stopped (status != _Pgcstop)signal arrived during external code executioncompileCallback: float arguments not supportedruntime: name offset base pointer out of rangeruntime: type offset base pointer out of rangeruntime: text offset base poin, xrefs: 004DC6E4
    • stopTheWorld: broken CPU time accountingglobal runq empty with non-zero runqsizemust be able to track idle limiter eventruntime: SyscallN has too many argumentsgoroutine stack size is not a power of 2oversized record received with length %dtls: received empty , xrefs: 004DC6FE
    • stopTheWorld: holding locksgcstopm: not waiting for gcruntime: checkdead: nmidle=runtime: checkdead: find g runlock of unlocked rwmutexsigsend: inconsistent statemakeslice: len out of rangemakeslice: cap out of rangegrowslice: len out of rangestack size not a , xrefs: 004DC745
    • stopTheWorld: not stopped (stopwait != 0)tls: internal error: unsupported key (%T)invalid value length: expected %d, got %dnet/url: invalid control character in URLidna: internal error in punycode encodingx509: cannot parse URI %q: invalid domaincrypto/md5: in, xrefs: 004DC62A
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: stopTheWorld: broken CPU time accountingglobal runq empty with non-zero runqsizemust be able to track idle limiter eventruntime: SyscallN has too many argumentsgoroutine stack size is not a power of 2oversized record received with length %dtls: received empty $stopTheWorld: holding locksgcstopm: not waiting for gcruntime: checkdead: nmidle=runtime: checkdead: find g runlock of unlocked rwmutexsigsend: inconsistent statemakeslice: len out of rangemakeslice: cap out of rangegrowslice: len out of rangestack size not a $stopTheWorld: not stopped (status != _Pgcstop)signal arrived during external code executioncompileCallback: float arguments not supportedruntime: name offset base pointer out of rangeruntime: type offset base pointer out of rangeruntime: text offset base poin$stopTheWorld: not stopped (stopwait != 0)tls: internal error: unsupported key (%T)invalid value length: expected %d, got %dnet/url: invalid control character in URLidna: internal error in punycode encodingx509: cannot parse URI %q: invalid domaincrypto/md5: in
    • API String ID: 0-1581966374
    • Opcode ID: 2cd1e88e2f759b69d16de389057723e5bc69446f30cae47812f97220e721def6
    • Instruction ID: 106fefc2b10e3d3374bdd4888e3e305349047fa2e4ce6bca9ad8869fd3995168
    • Opcode Fuzzy Hash: 2cd1e88e2f759b69d16de389057723e5bc69446f30cae47812f97220e721def6
    • Instruction Fuzzy Hash: 6EC19F76209B8586DB10CF22E4A436AB761F38ABC4F189127EE8D43765CF3DC486CB05
    Strings
    • runtime., xrefs: 004D85B2
    • runtime/internal/thread exhaustionlocked m0 woke upentersyscallblock spinningthreads=gp.waiting != nilunknown caller pcstack: frame={sp:runtime: nameOff runtime: typeOff runtime: textOff decryption failedhandshake failureillegal parametermissing extensionunrec, xrefs: 004D85E5
    • reflect., xrefs: 004D860C
    • bad restart PC-thread limitstopm spinning nmidlelocked= needspinning=randinit twicestore64 failedsemaRoot queuebad allocCountbad span statestack overflow untyped args out of range no module data in goroutine runtime: seq1=runtime: goid=.WithoutCancel.WithDea, xrefs: 004D86D3
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: bad restart PC-thread limitstopm spinning nmidlelocked= needspinning=randinit twicestore64 failedsemaRoot queuebad allocCountbad span statestack overflow untyped args out of range no module data in goroutine runtime: seq1=runtime: goid=.WithoutCancel.WithDea$reflect.$runtime.$runtime/internal/thread exhaustionlocked m0 woke upentersyscallblock spinningthreads=gp.waiting != nilunknown caller pcstack: frame={sp:runtime: nameOff runtime: typeOff runtime: textOff decryption failedhandshake failureillegal parametermissing extensionunrec
    • API String ID: 0-3201311403
    • Opcode ID: 2d73cdd278e380bc89d3ceec455d138a1b39f8209f48d6aadede79ff1ded6860
    • Instruction ID: add69674e477380d681a9cc68a8ad9579e3eb958aa88e8f8ef91b204d0caed6c
    • Opcode Fuzzy Hash: 2d73cdd278e380bc89d3ceec455d138a1b39f8209f48d6aadede79ff1ded6860
    • Instruction Fuzzy Hash: 1B719E32B04A4086DB148F21E4A03BBB7A5F785BA4F48813BDB4E57754DF7CD8918B08
    Strings
    • cnt=gcing MB, got= ... max=scav ptr ] = (usageinit ms, fault tab= top=[...], fp:tls: Earlyparsefilesimap2imap3imapspop3shostsutf-8%s*%dtext/bad nsse41sse42ssse3SHA-1P-224P-256P-384P-521ECDSA (at ClassStringFormat[]bytestringactiveclosedsocks5CANCELGOAWAYP, xrefs: 004ABF05
    • runtime: lfstack.push invalid packing: node=out of memory allocating heap arena metadata/cpu/classes/scavenge/background:cpu-secondsruntime: unexpected metric registration for gcmarknewobject called while doing checkmarkactive sweepers found at start of mark p, xrefs: 004ABEE5
    • packed=BAD RANK status unknown(trigger= npages= nalloc= nfreed=[signal newval= mcount= bytes, stack=[ minLC= maxpc= stack=[ minutes status= etypes tlskyberCurveID(finishedexporterReceivednetedns0[::1]:53continue_gatewayinvalid address readfromwsaioctlunix, xrefs: 004ABF25
    • -> node= ms cpu, (forced) wbuf1.n= wbuf2.n= s.limit= s.state= B work ( B exp.) marked unmarked in use), size = bad prune, tail = recover: not in [ctxt != 0, oldval=, newval= threads=: status= blocked= lockedg=atomicor8 runtime= m->curg=(unknown)tracebac, xrefs: 004ABF45
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: -> node= ms cpu, (forced) wbuf1.n= wbuf2.n= s.limit= s.state= B work ( B exp.) marked unmarked in use), size = bad prune, tail = recover: not in [ctxt != 0, oldval=, newval= threads=: status= blocked= lockedg=atomicor8 runtime= m->curg=(unknown)tracebac$ cnt=gcing MB, got= ... max=scav ptr ] = (usageinit ms, fault tab= top=[...], fp:tls: Earlyparsefilesimap2imap3imapspop3shostsutf-8%s*%dtext/bad nsse41sse42ssse3SHA-1P-224P-256P-384P-521ECDSA (at ClassStringFormat[]bytestringactiveclosedsocks5CANCELGOAWAYP$ packed=BAD RANK status unknown(trigger= npages= nalloc= nfreed=[signal newval= mcount= bytes, stack=[ minLC= maxpc= stack=[ minutes status= etypes tlskyberCurveID(finishedexporterReceivednetedns0[::1]:53continue_gatewayinvalid address readfromwsaioctlunix$runtime: lfstack.push invalid packing: node=out of memory allocating heap arena metadata/cpu/classes/scavenge/background:cpu-secondsruntime: unexpected metric registration for gcmarknewobject called while doing checkmarkactive sweepers found at start of mark p
    • API String ID: 0-2188752124
    • Opcode ID: 6666ecc3ccd40bdb717a5b278e3b84afe59da87cb612e4054fb2233e0c982598
    • Instruction ID: baa72108e5298d566187f9aa46fcfaa7f070a71dab7bf09b5dd3690d8f2ccfe1
    • Opcode Fuzzy Hash: 6666ecc3ccd40bdb717a5b278e3b84afe59da87cb612e4054fb2233e0c982598
    • Instruction Fuzzy Hash: AF218F32618B8586D700EF12E89136EA768F78AB84F48953BEA8C47726CF3CC451C758
    Strings
    • gp.waiting != nilunknown caller pcstack: frame={sp:runtime: nameOff runtime: typeOff runtime: textOff decryption failedhandshake failureillegal parametermissing extensionunrecognized namemultipartmaxpartsmessage too largepermission deniedwrong medium typeno da, xrefs: 004EAD90
    • ey, xrefs: 004EAD5B
    • selectgo: bad wakeupsemaRoot rotateRightreflect.makeFuncStubtrace: out of memorywirep: already in gounknown PSK identitycertificate requiredinvalid DNS responsegetadaptersaddressesunexpected network: gzip: invalid headerheader line too longGetProcessMemoryInfo, xrefs: 004EAD67
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: gp.waiting != nilunknown caller pcstack: frame={sp:runtime: nameOff runtime: typeOff runtime: textOff decryption failedhandshake failureillegal parametermissing extensionunrecognized namemultipartmaxpartsmessage too largepermission deniedwrong medium typeno da$selectgo: bad wakeupsemaRoot rotateRightreflect.makeFuncStubtrace: out of memorywirep: already in gounknown PSK identitycertificate requiredinvalid DNS responsegetadaptersaddressesunexpected network: gzip: invalid headerheader line too longGetProcessMemoryInfo$ey
    • API String ID: 0-4044303321
    • Opcode ID: c2b1dcb74d98368625a71bcca315baa9542bf1792ebc6fb9789f231320c47d70
    • Instruction ID: 76857f7f7d6583467dff2903ae735789f5a418706164f921c789822d4d976f27
    • Opcode Fuzzy Hash: c2b1dcb74d98368625a71bcca315baa9542bf1792ebc6fb9789f231320c47d70
    • Instruction Fuzzy Hash: D6B27532208BD0C2D720CF12E44879AB7A8F389B95F558526EF9D47B99CF78D8A0C745
    Strings
    • (scan MB in pacer: % CPU ( zombie, j0 = head = panic: nmsys= locks= dying= allocs m->g0= pad1= pad2= text= minpc= value= (scan)types : type nil keytls3desderivedInitialExpiresSubjectwindowswsarecvwsasendlookup writetocharsetCONOUT$\\.\UNCavx512fos/execr, xrefs: 004BEBA5
    • pacer: assist ratio=workbuf is not emptybad use of bucket.mpbad use of bucket.bpruntime: double waitpreempt off reason: forcegc: phase errorgopark: bad g statusgo of nil func valueselectgo: bad wakeupsemaRoot rotateRightreflect.makeFuncStubtrace: out of memory, xrefs: 004BEB86
    • MB) workers=min too large-byte block (runtime: val=runtime: seq=fatal error: idlethreads= syscalltick=load64 failedxadd64 failedxchg64 failednil stackbase}sched={pc:, gp->status= pluginpath= : unknown pc called from runtime: pid=tlsmaxrsasizeaccess denied, xrefs: 004BEC05
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: (scan MB in pacer: % CPU ( zombie, j0 = head = panic: nmsys= locks= dying= allocs m->g0= pad1= pad2= text= minpc= value= (scan)types : type nil keytls3desderivedInitialExpiresSubjectwindowswsarecvwsasendlookup writetocharsetCONOUT$\\.\UNCavx512fos/execr$ MB) workers=min too large-byte block (runtime: val=runtime: seq=fatal error: idlethreads= syscalltick=load64 failedxadd64 failedxchg64 failednil stackbase}sched={pc:, gp->status= pluginpath= : unknown pc called from runtime: pid=tlsmaxrsasizeaccess denied$pacer: assist ratio=workbuf is not emptybad use of bucket.mpbad use of bucket.bpruntime: double waitpreempt off reason: forcegc: phase errorgopark: bad g statusgo of nil func valueselectgo: bad wakeupsemaRoot rotateRightreflect.makeFuncStubtrace: out of memory
    • API String ID: 0-163087891
    • Opcode ID: 1bceb77ac407167870e19d547858bf70ab164a2481ed5f3064b9dafa3df56d77
    • Instruction ID: 4a2f94690dfd70726a08bc6d60448aae17bd88ff776040c7b24daafe43f4ec7b
    • Opcode Fuzzy Hash: 1bceb77ac407167870e19d547858bf70ab164a2481ed5f3064b9dafa3df56d77
    • Instruction Fuzzy Hash: CC71B432908F9485D701EB26E44039AB768FB9ABC4F44832BEA8D67725CF3CC492C754
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: \$]7S
    • API String ID: 0-311488551
    • Opcode ID: 083e5d4ea698489c7d6080a4d91190962d448acb878ccdf425f58a96228b5bb3
    • Instruction ID: ccb272243f5bbf7164a0005ae9c44ad53a18b39f7153a275db1bff328a4f27b5
    • Opcode Fuzzy Hash: 083e5d4ea698489c7d6080a4d91190962d448acb878ccdf425f58a96228b5bb3
    • Instruction Fuzzy Hash: 68227162709BC185DB20CF26E4547AAAB61F38ABD0F448626EF8D57B59DF3CC585CB00
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: "$)P
    • API String ID: 0-1414339957
    • Opcode ID: 453c2a69f11b4cfc657d833a8e41cffdb0b0fb7b83204e032821b8400047eee1
    • Instruction ID: 0c1fb02fc80adbd980431b0ce70ccaf8fc5ec460903cb57bf6dd1db9d089f717
    • Opcode Fuzzy Hash: 453c2a69f11b4cfc657d833a8e41cffdb0b0fb7b83204e032821b8400047eee1
    • Instruction Fuzzy Hash: 0C329F72208BC585DB20CF65E4853EEBB61F786794F14862ADA9C17BAACF39C445C740
    Strings
    • runtime: malformed profBuf buffer - invalid sizeattempt to trace invalid or unsupported P statusruntime: waitforsingleobject wait_failed; errno=failed to parse certificate #%d in the chain: %wtls: no supported symmetric ciphersuites for ECHtls: CurvePreference, xrefs: 004E8235
    • runtime: malformed profBuf buffer - tag and data out of synctls: no supported versions satisfy MinVersion and MaxVersiontls: initial handshake had non-empty renegotiation extensiontls: server resumed a session with a different EMS extensionexec: Cmd started a , xrefs: 004E8265
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: runtime: malformed profBuf buffer - invalid sizeattempt to trace invalid or unsupported P statusruntime: waitforsingleobject wait_failed; errno=failed to parse certificate #%d in the chain: %wtls: no supported symmetric ciphersuites for ECHtls: CurvePreference$runtime: malformed profBuf buffer - tag and data out of synctls: no supported versions satisfy MinVersion and MaxVersiontls: initial handshake had non-empty renegotiation extensiontls: server resumed a session with a different EMS extensionexec: Cmd started a
    • API String ID: 0-3242746415
    • Opcode ID: 2c074ba6a09fe3c7053438622f3c844286eb46854b9bfa712e2cb3a281bf49b1
    • Instruction ID: 0abe929b1fcc756195f7628bd3a4879c68cdfc2406c6a8769c8739857491503c
    • Opcode Fuzzy Hash: 2c074ba6a09fe3c7053438622f3c844286eb46854b9bfa712e2cb3a281bf49b1
    • Instruction Fuzzy Hash: 81D1F022705A9482DE149F67E40176B6B61F78AFC6F49942AEE0E97710DF7CCC82C308
    Strings
    • runtime: inconsistent read deadlineNtCreateWaitCompletionPacket failedfindrunnable: netpoll with spinningpidleput: P has non-empty run queuetraceback did not unwind completelyruntime: createevent failed; errno=unsupported signature algorithm: %vtls: too many n, xrefs: 004D0BCD
    • runtime: inconsistent write deadlineUnable to determine system directoryruntime: VirtualQuery failed; errno=runtime: sudog with non-nil waitlinkruntime: mcall called on m->g0 stackstartm: P required for spinning=true) is not Grunnable or Gscanrunnableruntime:, xrefs: 004D0B5E
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: runtime: inconsistent read deadlineNtCreateWaitCompletionPacket failedfindrunnable: netpoll with spinningpidleput: P has non-empty run queuetraceback did not unwind completelyruntime: createevent failed; errno=unsupported signature algorithm: %vtls: too many n$runtime: inconsistent write deadlineUnable to determine system directoryruntime: VirtualQuery failed; errno=runtime: sudog with non-nil waitlinkruntime: mcall called on m->g0 stackstartm: P required for spinning=true) is not Grunnable or Gscanrunnableruntime:
    • API String ID: 0-921591563
    • Opcode ID: 76aaddf56cca2591d2491c0061746a27d42f9e29e9baf6f7828a708f6da993ef
    • Instruction ID: 53421a8af33a77f40023f3f94ba1e8e898c2edff7573d962e1b68cfb1fb47b31
    • Opcode Fuzzy Hash: 76aaddf56cca2591d2491c0061746a27d42f9e29e9baf6f7828a708f6da993ef
    • Instruction Fuzzy Hash: 4651E43230E74085CB64CBA5E06433FBBA0F796B98F19456BEA9D03795CB7CD8408749
    Strings
    • !"#$%%&&''((()))*++,,,,,------....//////0001123333333333444444444455666677777888888888889999999999::::::;;;;;;;;;;;;;;;;<<<<<<<<<<<<<<<<=====>>>>>>>>>>>??????????@@@@@@@@@@@@@@@@@@@@@@AAAAAAAAAAAAAAAAAAAAABBBBBBBBBBBCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC, xrefs: 0050C34D, 0050C456, 0050C597, 0050C6BF
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: !"#$%%&&''((()))*++,,,,,------....//////0001123333333333444444444455666677777888888888889999999999::::::;;;;;;;;;;;;;;;;<<<<<<<<<<<<<<<<=====>>>>>>>>>>>??????????@@@@@@@@@@@@@@@@@@@@@@AAAAAAAAAAAAAAAAAAAAABBBBBBBBBBBCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
    • API String ID: 0-2911004680
    • Opcode ID: a228e8f1463bc9528876bc78fb9a805b6a10359a95dc952a3dfed461cf1be21f
    • Instruction ID: fef7576312ab35d062b078f18bd7e7dac36b9c0b2454cf8a60b73528c8e40036
    • Opcode Fuzzy Hash: a228e8f1463bc9528876bc78fb9a805b6a10359a95dc952a3dfed461cf1be21f
    • Instruction Fuzzy Hash: B5F13632315A8082EA10DF69E8043ADAF65F786BD0F898625EF5E477D5CFB8C895C704
    Strings
    • ParseUint[%v = %d]websocketsucceededSee OtherUse ProxyForbiddenNot FoundToo EarlyTrailer: protocol nil errorfork/exec#execwaitWednesdaySeptemberinterruptbus errorntdll.dllole32.dllpsapi.dllwinmm.dllFindCloseLocalFreeMoveFileWPurgeCommSetupCommWriteFileWSASendT, xrefs: 0052D23E, 0052D272, 0052D2A4, 0052D3BD, 0052D47D, 0052D53D, 0052D5FD, 0052D6E3
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: ParseUint[%v = %d]websocketsucceededSee OtherUse ProxyForbiddenNot FoundToo EarlyTrailer: protocol nil errorfork/exec#execwaitWednesdaySeptemberinterruptbus errorntdll.dllole32.dllpsapi.dllwinmm.dllFindCloseLocalFreeMoveFileWPurgeCommSetupCommWriteFileWSASendT
    • API String ID: 0-4063562177
    • Opcode ID: 4224e0abbee2552c425d7d77cafb44739a73c205936917f6ebb721ef109d7d53
    • Instruction ID: add51a36910f3ab9e834b040a6ea44dcf3f7437195746ddc19545da9849fcf88
    • Opcode Fuzzy Hash: 4224e0abbee2552c425d7d77cafb44739a73c205936917f6ebb721ef109d7d53
    • Instruction Fuzzy Hash: AF02AC72618B50C5EB00DF11F8443AA7BB5FB8ABD0F459026EA8E477A9DB7CC590C750
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: M
    • API String ID: 0-2060442770
    • Opcode ID: 7661dfb583fb0d65e9b9b0fd2f290a0145f24f08469e85c496d8fc8ff6172b68
    • Instruction ID: e8c927207decea7aac38ba80b1b323cbe9d9267796cf560090a9e3a1a532e18c
    • Opcode Fuzzy Hash: 7661dfb583fb0d65e9b9b0fd2f290a0145f24f08469e85c496d8fc8ff6172b68
    • Instruction Fuzzy Hash: 0CD19236209B8585DB64CB16E4403AEBBA1F386B84F59D036DE8D43B9ADF78C485D701
    Strings
    • ParseIntscavengepollDesctraceBufdeadlockraceFinipanicnilcgocheckrunnable procid rax rbx rcx rdx rdi rsi rbp rsp r8 r9 r10 r11 r12 r13 r14 r15 rip rflags cs fs gs is not poi, xrefs: 0052D983, 0052DA63, 0052DB08, 0052DB99
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: ParseIntscavengepollDesctraceBufdeadlockraceFinipanicnilcgocheckrunnable procid rax rbx rcx rdx rdi rsi rbp rsp r8 r9 r10 r11 r12 r13 r14 r15 rip rflags cs fs gs is not poi
    • API String ID: 0-4012776879
    • Opcode ID: cf299124b97538b6825dff9760316ae2239df04384685c1b1ffc6b5162a194f9
    • Instruction ID: 00186b4103ba90b6fc64b254955a24a1d480fdc1b7a41a5550861c1258b9fa90
    • Opcode Fuzzy Hash: cf299124b97538b6825dff9760316ae2239df04384685c1b1ffc6b5162a194f9
    • Instruction Fuzzy Hash: B0C18E72608B50C5EB14DF15F84439A7BB5FB8ABC0F498526EA8D47BA9DF38C891C740
    Strings
    • runtime: cannot allocate memorycheckmark found unmarked objectruntime: failed to commit pages/memory/classes/heap/free:bytes/memory/classes/os-stacks:bytespacer: sweep done at heap size non in-use span in unswept listruntime.Pinner: argument is nilcasgstatus: , xrefs: 004CD1C5
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: runtime: cannot allocate memorycheckmark found unmarked objectruntime: failed to commit pages/memory/classes/heap/free:bytes/memory/classes/os-stacks:bytespacer: sweep done at heap size non in-use span in unswept listruntime.Pinner: argument is nilcasgstatus:
    • API String ID: 0-1312986596
    • Opcode ID: 3cb92977038153dc2979b7a150ccb6bd88210ce3b6e7b4be6c1263f200cbbc81
    • Instruction ID: 14dba0acba049bb1c514e8cb2166c38755f9fa6ae3d3512a971763c328756ce5
    • Opcode Fuzzy Hash: 3cb92977038153dc2979b7a150ccb6bd88210ce3b6e7b4be6c1263f200cbbc81
    • Instruction Fuzzy Hash: 82A15E7AB08B9481CA50CB16E48075BA765F389BC4F48512BEF8D57B29CF3CC592CB44
    Strings
    • bulkBarrierPreWrite: unaligned argumentsruntime: typeBitsBulkBarrier with type refill of span with free space remaining/cpu/classes/scavenge/assist:cpu-secondsruntime.SetFinalizer: first argument is failed to acquire lock to reset capacitymarkWorkerStop: unkn, xrefs: 004B1B07
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: bulkBarrierPreWrite: unaligned argumentsruntime: typeBitsBulkBarrier with type refill of span with free space remaining/cpu/classes/scavenge/assist:cpu-secondsruntime.SetFinalizer: first argument is failed to acquire lock to reset capacitymarkWorkerStop: unkn
    • API String ID: 0-2740983204
    • Opcode ID: 8ad8cd977b802c9c3d5ddce170431e314ae48fe622913f19cfbd176385c7262b
    • Instruction ID: b6e75438d4f7d59987ad6d4f697b011473fefb11553e5fbd85607b5863fa3906
    • Opcode Fuzzy Hash: 8ad8cd977b802c9c3d5ddce170431e314ae48fe622913f19cfbd176385c7262b
    • Instruction Fuzzy Hash: 9291A1B6709B8482DB108B56E45439AA7A5F389FC0F988127EF8D57B28DF3CC496C714
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: KP
    • API String ID: 0-3219806408
    • Opcode ID: f4ab8d2d9e235c195cd6c7620446c94ae132eeffb285f0bd5e3a0244cbaba81f
    • Instruction ID: eaf818aaf1f2fdf84177ab8bee3b0e2349a83fb5faf6d7150df251e5e36957db
    • Opcode Fuzzy Hash: f4ab8d2d9e235c195cd6c7620446c94ae132eeffb285f0bd5e3a0244cbaba81f
    • Instruction Fuzzy Hash: 68A17F36605A84C6D700CB26E49536EBB61F38AB90F098227EF9C43759CF7DD486CB44
    Strings
    • bad summary dataruntime: addr = runtime: base = runtime: head = timeBeginPeriod, xrefs: 004CC247
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: bad summary dataruntime: addr = runtime: base = runtime: head = timeBeginPeriod
    • API String ID: 0-2099802129
    • Opcode ID: 49f0093b5d87ea48fcee75634ac19bcc116657794dd41c2e224bd420e2539699
    • Instruction ID: 6b832a9c94598a25cd658525ae7505d9c9211495353e5b55f85c6083c9f354a6
    • Opcode Fuzzy Hash: 49f0093b5d87ea48fcee75634ac19bcc116657794dd41c2e224bd420e2539699
    • Instruction Fuzzy Hash: E161DDB7B14B8882DB409B56E48039A7765F78ABD0F44922AEF9D1379ACF3CC581C740
    Strings
    • 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899, xrefs: 00531A3E
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
    • API String ID: 0-2272463933
    • Opcode ID: 22a7a57254d3df51cdd571937fd1bb61d785f5412c89b132bab65489d13616d1
    • Instruction ID: a2fbe745f98d6e22b17202b5da3f7314a0d15c04eff57845547cccaab74e275d
    • Opcode Fuzzy Hash: 22a7a57254d3df51cdd571937fd1bb61d785f5412c89b132bab65489d13616d1
    • Instruction Fuzzy Hash: 2B417623749E9482DB188B3A942177CAF11F3D5BD0F999A1ACE4B07781CE28CC52C388
    Strings
    • gcing MB, got= ... max=scav ptr ] = (usageinit ms, fault tab= top=[...], fp:tls: Earlyparsefilesimap2imap3imapspop3shostsutf-8%s*%dtext/bad nsse41sse42ssse3SHA-1P-224P-256P-384P-521ECDSA (at ClassStringFormat[]bytestringactiveclosedsocks5CANCELGOAWAYPADDED, xrefs: 004B7FB4
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: gcing MB, got= ... max=scav ptr ] = (usageinit ms, fault tab= top=[...], fp:tls: Earlyparsefilesimap2imap3imapspop3shostsutf-8%s*%dtext/bad nsse41sse42ssse3SHA-1P-224P-256P-384P-521ECDSA (at ClassStringFormat[]bytestringactiveclosedsocks5CANCELGOAWAYPADDED
    • API String ID: 0-2467681893
    • Opcode ID: 1c3ca4e65e27f15707a7bcf62557b3472bb1b26f7963b0fa7a17b507d571a41e
    • Instruction ID: 38c7f675391c330c0c67c4b59e8d75c476942596a8ff434aab9b9eacd540f74a
    • Opcode Fuzzy Hash: 1c3ca4e65e27f15707a7bcf62557b3472bb1b26f7963b0fa7a17b507d571a41e
    • Instruction Fuzzy Hash: 81517B32209B80C6E710CF25F48539A7BA4F796784F41822BEA8C43766DF7DC499CB55
    Strings
    • gcmarknewobject called while doing checkmarkactive sweepers found at start of mark phaseno P available, write barriers are forbiddencompileCallback: float results not supportedcannot trace user goroutine on its own stackunsafe.Slice: ptr is nil and len is not , xrefs: 004BE7F0
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID: gcmarknewobject called while doing checkmarkactive sweepers found at start of mark phaseno P available, write barriers are forbiddencompileCallback: float results not supportedcannot trace user goroutine on its own stackunsafe.Slice: ptr is nil and len is not
    • API String ID: 0-3110597650
    • Opcode ID: 5ea65cabca027ba43264be2b134412e8c0307318bddfd5d5c446bc6a84b2cee3
    • Instruction ID: 1b6e632f3906524b00488ad16f0841cb276b41eef1d265cf1c212226bfe9cc0a
    • Opcode Fuzzy Hash: 5ea65cabca027ba43264be2b134412e8c0307318bddfd5d5c446bc6a84b2cee3
    • Instruction Fuzzy Hash: 2621CCF3B02AC446EB049F15D4803E86B22E39AFD8F4AA076CF4A57756CA6CC592C300
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: f79cdacbc71f03c22c082229d7b9a8420ce33d1af2c3ac9f884b477bdc99f8d7
    • Instruction ID: b6113b17ed71ec7767fef9d59261cf546170c5ed298124517f40ea78c558a67f
    • Opcode Fuzzy Hash: f79cdacbc71f03c22c082229d7b9a8420ce33d1af2c3ac9f884b477bdc99f8d7
    • Instruction Fuzzy Hash: B7221572A1669486FF228B26D0403FA6F65F394FD4F185412EE8D1779ADB2CC8D1D702
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 9734db6d3e92427208a8d53dd37f2c9170517f83ba5621b92c689f626280ff5a
    • Instruction ID: 3699354820791a3de87b0f57ff5c94f4732dff421b0bf11589575ad8ccfc8781
    • Opcode Fuzzy Hash: 9734db6d3e92427208a8d53dd37f2c9170517f83ba5621b92c689f626280ff5a
    • Instruction Fuzzy Hash: 5302FEB3B18A9082DB648B26E04037AAF65F395FD4F485451FF8D1BB99DB78C8D29700
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b35ce4284d0a7f0ad00d9dbb807d2d255040cc1bcf6f63037f61fe09f934b5c4
    • Instruction ID: f8d1d161ecf70dd441ef8943247900c59202a7b2b4842e44e69aa9c8880363c3
    • Opcode Fuzzy Hash: b35ce4284d0a7f0ad00d9dbb807d2d255040cc1bcf6f63037f61fe09f934b5c4
    • Instruction Fuzzy Hash: 7612AA73A18FC481D6318B65E4403EAAB60F399B84F54A616DF9D17B5AEF38D5E0CB00
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b420e5dd93916f64e044037361f9ed73a7307d4062299c10eb327b604a539a84
    • Instruction ID: d92a766d2de5b01ca107f92fe5851436436261b0e9b8ebc8dddc02ea1ccb5a7b
    • Opcode Fuzzy Hash: b420e5dd93916f64e044037361f9ed73a7307d4062299c10eb327b604a539a84
    • Instruction Fuzzy Hash: C1E11976E18554C9EF644B1AE8813BD2F26F381794F881472EA4D1B39BDB28CCE5E314
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 415f2d9b4f69222b36fd8747659d5a7fddf02b1f4d877b79fd208ede2ca979c3
    • Instruction ID: 68c653050b0c7da176dd5b3af9b0f9f76a4d0b6e437068a1cc2b5bb5236de8a9
    • Opcode Fuzzy Hash: 415f2d9b4f69222b36fd8747659d5a7fddf02b1f4d877b79fd208ede2ca979c3
    • Instruction Fuzzy Hash: 6CE18AB6608B84C6CB14CB16E48436DBBA5F3CAFC0F589526CE9E47759DBB8C891C740
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 3e72756fb1357e44877bdef18b62b98eb22d787ffb3d0fc95f35e8291ad6527e
    • Instruction ID: 82a4971e5dc84cf06228444522cf7b7ef88d174b49f796770113c948a195db18
    • Opcode Fuzzy Hash: 3e72756fb1357e44877bdef18b62b98eb22d787ffb3d0fc95f35e8291ad6527e
    • Instruction Fuzzy Hash: 0CC1D633B09E9482CE14CF76E401BAAAB64F395FC4F485421EE8E87B19DB79C945CB44
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 717f3db0a353065965019076acecbc8015bbf492bcced9f09dda771f3c34e7a9
    • Instruction ID: c1f337f3ad40b9b45bee9561b33e4e66927a71eda4210c604ebcdc81c03c2ba2
    • Opcode Fuzzy Hash: 717f3db0a353065965019076acecbc8015bbf492bcced9f09dda771f3c34e7a9
    • Instruction Fuzzy Hash: DAD1E2B2715A89C2DA248B40E5403BA7764F38AB84F854227DB9E17B89CF7CC456C74A
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a43b47099751903cbfbf412907f2adce9326f72f1cea61a6a3c4137a1bc5d3ed
    • Instruction ID: 55e9f5a7f776c6b430d2a7112af4f94b5d0b3b01883837b6019a6eb6e4095012
    • Opcode Fuzzy Hash: a43b47099751903cbfbf412907f2adce9326f72f1cea61a6a3c4137a1bc5d3ed
    • Instruction Fuzzy Hash: F7B12D73F18544DAFB24CF71D85A7AA5B43B389750F86C866E90E87782DA28CB95C700
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 28810612674ddcc625ccc677d65d5adf9e6e06b8177089a3cd9410055760da79
    • Instruction ID: 4b434878f58038d783cc595db9be9ab0eaf524aca37659edbd49600b386d6d40
    • Opcode Fuzzy Hash: 28810612674ddcc625ccc677d65d5adf9e6e06b8177089a3cd9410055760da79
    • Instruction Fuzzy Hash: 3ED1F232314B4A82CA10DB05E404B7A7B65FB5ABC0F958626EF9D47B59CF7CC84AC748
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 0e4b1a82658b9094ec1051d519a7bbfcb3b08c56d820de6126a2971ee0fe6f7e
    • Instruction ID: f443c707ea280c49105bc40e7c1653a8edcc21674a88cac654d1fde9028d1615
    • Opcode Fuzzy Hash: 0e4b1a82658b9094ec1051d519a7bbfcb3b08c56d820de6126a2971ee0fe6f7e
    • Instruction Fuzzy Hash: E7D15D32609B8486EA61DB16F4903AEBB65F7C5BC0F548426EF8D47B29DF39C495CB00
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 6a622ce6501772b44420fc1c0a0fe9efe06c3a8a15d55709b40d7139d8e5889f
    • Instruction ID: 0892b393698a7ec879b16bf9102a87630ca8d5eb6feb97f8e9a106dd466104b4
    • Opcode Fuzzy Hash: 6a622ce6501772b44420fc1c0a0fe9efe06c3a8a15d55709b40d7139d8e5889f
    • Instruction Fuzzy Hash: 52D16872209B84C6DA68DF16E48036EBB61F7C6BC0F549426EB8E47B59DF39C491CB10
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 56d9178053e887eff0e2e2b3d5abbd3828ffe7b55228766584ea43966a721631
    • Instruction ID: 098f7b4b99a23be6f1e4630d18a02f7915005e7840feff1f569c88127c44e62d
    • Opcode Fuzzy Hash: 56d9178053e887eff0e2e2b3d5abbd3828ffe7b55228766584ea43966a721631
    • Instruction Fuzzy Hash: C2B1F363204B8AC6DB50CF95E0007ED7B65F3AABC4F949212EA8D07799CF78C555C781
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a334dc95b6cc58b00a247639c1e121659b04f79bd589aca131386812b4e7744d
    • Instruction ID: 8d64fd9130437af00fe380c3d5e46757f2cb000701b476ae08dbd379b8d3f684
    • Opcode Fuzzy Hash: a334dc95b6cc58b00a247639c1e121659b04f79bd589aca131386812b4e7744d
    • Instruction Fuzzy Hash: 3C91E6723186C186CB24CB27A540B6BAB61F789BC5F485127EF9D47B15CB7CC891CB44
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 440d47c7488a388788ab247d6ffb0abb63c11723b2173531378ea3bb94622e5d
    • Instruction ID: 608e728db270d078301422863913df38301cf48f063ae0de75f510e5cad19c4c
    • Opcode Fuzzy Hash: 440d47c7488a388788ab247d6ffb0abb63c11723b2173531378ea3bb94622e5d
    • Instruction Fuzzy Hash: 70B1FB16E1CFCA50E613567C9403B762B106FF35C4F01D73ABAC2F1AA3DB566910BA22
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: f54b3405961686a0f2ca623e98a71748eadd91df70ef3cd54bd88e104f306719
    • Instruction ID: 014f432d8bd917ca9f1bf5fbf0567732d84c4b0f561241b673e75b536a4a1bea
    • Opcode Fuzzy Hash: f54b3405961686a0f2ca623e98a71748eadd91df70ef3cd54bd88e104f306719
    • Instruction Fuzzy Hash: 65A1797A618B8482DB608B15F08039AB7A5F78ABD4F14522AEFDD43B59DF3CD495CB00
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 8492f6e6a7844f789619f13ae9f700f3fb20b6747a64655f2feaf739ba6bec18
    • Instruction ID: c0c33c12a8a2ec3767d5bebdc05fcff0eb217739c1ccd608e759e3fb3bc3868f
    • Opcode Fuzzy Hash: 8492f6e6a7844f789619f13ae9f700f3fb20b6747a64655f2feaf739ba6bec18
    • Instruction Fuzzy Hash: 7181A177718B8482DB508F15E4807AAA762F78ABC4F04512AEF9E17B5ACB3CC4A1C744
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: d6bc9722e48fc01aa2d550b8aaec47f96509c70388fbb1539311380854bad696
    • Instruction ID: 461f2437f9e35824ea9af2235bf590d30d2d0974e7c14dd2dd7c7e710561a9ea
    • Opcode Fuzzy Hash: d6bc9722e48fc01aa2d550b8aaec47f96509c70388fbb1539311380854bad696
    • Instruction Fuzzy Hash: E66113F2304B9886CB058A1AD5803EA77E6F784FD4F88D226DF5D0BB98DA79C559C340
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c073c20cfb70d9e904c1891120d6e3e3b8c98f5a3d3d79000b3b82815186fbb6
    • Instruction ID: 486c764d81f6f7a60f5b7f8a4a61ebf93e6ffb8a8f377d298c6109a822184839
    • Opcode Fuzzy Hash: c073c20cfb70d9e904c1891120d6e3e3b8c98f5a3d3d79000b3b82815186fbb6
    • Instruction Fuzzy Hash: 30413922B81A4CCADF149A3494513B722A6D380774FCC4677CF2D473E2E26C94E59618
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 7cab0fa6efc13eaace6dcf5f7f238e2c0832e8f776f8de2402e1428158b6abce
    • Instruction ID: bc61993b29605ebca52d16c531752fb3738885505cc2deed8002cfb29508097e
    • Opcode Fuzzy Hash: 7cab0fa6efc13eaace6dcf5f7f238e2c0832e8f776f8de2402e1428158b6abce
    • Instruction Fuzzy Hash: 7441E9A1701A5481EE04CF1689182AAF361E75FFE0B49A133DF1D77B68C76CD816C349
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 7e0e5bb6a338d5065fdbe4d516e957055d3cebd9c496ce69356f21bbc8f65ed1
    • Instruction ID: 65ecdf26b4bbe43ad658d00ac705f2e11dad1a899fc0cc41ffb5477d7dc338e6
    • Opcode Fuzzy Hash: 7e0e5bb6a338d5065fdbe4d516e957055d3cebd9c496ce69356f21bbc8f65ed1
    • Instruction Fuzzy Hash: 7E518172B09E9886CB15CB16E08036BAB61F789BD4F089517EF8D17B49CB3CD591CB04
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ec42449cbe7015911f826dd1ccd484021bb59d44e7fe677b2b1ebe4151aaa619
    • Instruction ID: b38761457653a4b2bbe6a67d564e3d9cfe87bc4428bb6d9cdc37471b3e8e600f
    • Opcode Fuzzy Hash: ec42449cbe7015911f826dd1ccd484021bb59d44e7fe677b2b1ebe4151aaa619
    • Instruction Fuzzy Hash: B651157A605B8485DA41CB35E55072AB362FBC6BE4F18872BEA6D13B95DF3CC0918708
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 5e803be071de6aff7e260b228c36a46575c3f9121b44a3a804a9efa9ed2b5cfd
    • Instruction ID: db62d3269dbd803de1ba0e11f87a64d3b4791e4fbed26cf4300bb8055189c409
    • Opcode Fuzzy Hash: 5e803be071de6aff7e260b228c36a46575c3f9121b44a3a804a9efa9ed2b5cfd
    • Instruction Fuzzy Hash: 5C3116A2B1BF848ACD47DB7A5460B20820A6F97BE4F54C7335C3B762E5EB2D84438204
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: fffa9cb39625c63f587e59e84902ba3b9cb43eb51a0d7af04cb9ddf263d4ae89
    • Instruction ID: 17cc2462a39c0e41ac273a23cdf17f3a4a430e8ef40e84f08c97de4d27c97159
    • Opcode Fuzzy Hash: fffa9cb39625c63f587e59e84902ba3b9cb43eb51a0d7af04cb9ddf263d4ae89
    • Instruction Fuzzy Hash: 82312EEBD19FCD05FA1347399443692A610AFF76E4A10E743FEF132A12EB14B6A46314
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c2d3871379ef4234a58a4aca6178531caa16d61f67b9b99e0eef8b4734e8d601
    • Instruction ID: 3e9fda2c60c69e9f39f7d1e894a625bb9dd86339e1cd496efb5798bd2acc3542
    • Opcode Fuzzy Hash: c2d3871379ef4234a58a4aca6178531caa16d61f67b9b99e0eef8b4734e8d601
    • Instruction Fuzzy Hash: E031E8BA302B844ADAD4CB335654A8963ABF798BC4B159239DF0D93724EB39D4A5C300
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 092f23c08cb5cfca720c067935acdf67b27ca8d5a987054025cc771cd1aef0e2
    • Instruction ID: 13745d0b9e01772cdeb20324523468a3f56f0920c622d0bf7fa7cc06d4a09a13
    • Opcode Fuzzy Hash: 092f23c08cb5cfca720c067935acdf67b27ca8d5a987054025cc771cd1aef0e2
    • Instruction Fuzzy Hash: 0411EEE1E26F440EDA47C73A9551351821B5FEBBD0F68D323BD1BB6796EB2990D38100
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 156a7beeb203a26e7f0815e4bb70240e6ef6d90e906f0264561fffd1184a11a6
    • Instruction ID: 86c21e82c3e2cb4034f31b105a661dcec031209ef600d20ec747357ff8fbd2b4
    • Opcode Fuzzy Hash: 156a7beeb203a26e7f0815e4bb70240e6ef6d90e906f0264561fffd1184a11a6
    • Instruction Fuzzy Hash: EF11EF339111B046E702CB3ED804AAA7BA2F389B9DF6AC340DF92534DEC5254A0396E0
    Memory Dump Source
    • Source File: 00000000.00000002.3253312057.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
    • Associated: 00000000.00000002.3253278260.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253554645.0000000000711000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253795010.000000000099B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253816255.000000000099E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253831485.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253846981.00000000009A0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253870240.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253886077.00000000009C4000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253900519.00000000009C6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253921348.00000000009D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009D6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.00000000009F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253937702.0000000000A20000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3253994420.0000000000A27000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254013222.0000000000A37000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3254033034.0000000000A38000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4a0000_D_47267_1687617Q.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 1766fef994a4eb0576a4b1e7ccb2889f0455099ce3f161999410101d31ec1012
    • Instruction ID: 4404c64485e45b7d7efb2631e1d53af2ad5d30f000bf572ea48d09091132651d
    • Opcode Fuzzy Hash: 1766fef994a4eb0576a4b1e7ccb2889f0455099ce3f161999410101d31ec1012
    • Instruction Fuzzy Hash: DCC02BF1A07BC738FF14C30471003843DC19F453C0F80C090828800619D63CC2D08204