Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
5yv6ZxNaTP.exe

Overview

General Information

Sample name:5yv6ZxNaTP.exe
renamed because original name is a hash value
Original sample name:121222d12d96665d88f8e60a419329f0.exe
Analysis ID:1546425
MD5:121222d12d96665d88f8e60a419329f0
SHA1:51ed963231e60e1b6bcbbf81f325184f4a314beb
SHA256:1fcc27fc5d5ab23eb89fecedaf7c036fa5d9fee5854868dcc0b98d2023fbdb2c
Tags:64exetrojan
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Sigma detected: Powershell create lnk in startup
AI detected suspicious sample
Contains functionality to registers a callback to get notified when the system is suspended or resumed (often done by Miners)
Potentially malicious time measurement code found
Powershell creates an autostart link
Sigma detected: Potential Startup Shortcut Persistence Via PowerShell.EXE
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 5yv6ZxNaTP.exe (PID: 7736 cmdline: "C:\Users\user\Desktop\5yv6ZxNaTP.exe" MD5: 121222D12D96665D88F8E60A419329F0)
    • powershell.exe (PID: 7764 cmdline: powershell -Command "$ws = New-Object -ComObject WScript.Shell; $s = $ws.CreateShortcut('C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Nexus.lnk'); $s.TargetPath = 'C:\Users\user\Desktop\5yv6ZxNaTP.exe'; $s.Save()" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7772 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • 5yv6ZxNaTP.exe (PID: 8076 cmdline: "C:\Users\user\Desktop\5yv6ZxNaTP.exe" MD5: 121222D12D96665D88F8E60A419329F0)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: File createdAuthor: Christopher Peacock '@securepeacock', SCYTHE: Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7764, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Nexus.lnk
Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7764, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Nexus.lnk
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -Command "$ws = New-Object -ComObject WScript.Shell; $s = $ws.CreateShortcut('C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Nexus.lnk'); $s.TargetPath = 'C:\Users\user\Desktop\5yv6ZxNaTP.exe'; $s.Save()", CommandLine: powershell -Command "$ws = New-Object -ComObject WScript.Shell; $s = $ws.CreateShortcut('C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Nexus.lnk'); $s.TargetPath = 'C:\Users\user\Desktop\5yv6ZxNaTP.exe'; $s.Save()", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\5yv6ZxNaTP.exe", ParentImage: C:\Users\user\Desktop\5yv6ZxNaTP.exe, ParentProcessId: 7736, ParentProcessName: 5yv6ZxNaTP.exe, ProcessCommandLine: powershell -Command "$ws = New-Object -ComObject WScript.Shell; $s = $ws.CreateShortcut('C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Nexus.lnk'); $s.TargetPath = 'C:\Users\user\Desktop\5yv6ZxNaTP.exe'; $s.Save()", ProcessId: 7764, ProcessName: powershell.exe

Persistence and Installation Behavior

barindex
Source: Process startedAuthor: Joe Security: Data: Command: powershell -Command "$ws = New-Object -ComObject WScript.Shell; $s = $ws.CreateShortcut('C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Nexus.lnk'); $s.TargetPath = 'C:\Users\user\Desktop\5yv6ZxNaTP.exe'; $s.Save()", CommandLine: powershell -Command "$ws = New-Object -ComObject WScript.Shell; $s = $ws.CreateShortcut('C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Nexus.lnk'); $s.TargetPath = 'C:\Users\user\Desktop\5yv6ZxNaTP.exe'; $s.Save()", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\5yv6ZxNaTP.exe", ParentImage: C:\Users\user\Desktop\5yv6ZxNaTP.exe, ParentProcessId: 7736, ParentProcessName: 5yv6ZxNaTP.exe, ProcessCommandLine: powershell -Command "$ws = New-Object -ComObject WScript.Shell; $s = $ws.CreateShortcut('C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Nexus.lnk'); $s.TargetPath = 'C:\Users\user\Desktop\5yv6ZxNaTP.exe'; $s.Save()", ProcessId: 7764, ProcessName: powershell.exe
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-10-31T21:42:28.628320+010020229301A Network Trojan was detected20.109.210.53443192.168.2.849708TCP
2024-10-31T21:43:06.981805+010020229301A Network Trojan was detected20.109.210.53443192.168.2.849720TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.1% probability

Bitcoin Miner

barindex
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005D4800 LoadLibraryExW,0_2_005D4800
Source: 5yv6ZxNaTP.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 4x nop then cmp rdx, rbx0_2_005AC2E0
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 4x nop then cmp rdx, 40h0_2_005C1420
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 4x nop then shr r10, 0Dh0_2_005CC640
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 4x nop then shr r10, 0Dh0_2_005CDAC0
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 4x nop then lock or byte ptr [rdx], dil0_2_005C1B60
Source: global trafficTCP traffic: 192.168.2.8:49705 -> 185.196.10.218:9889
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.8:49720
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.8:49708
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_0060C0E0 WSARecv,0_2_0060C0E0
Source: powershell.exe, 00000001.00000002.1461262502.00000267358B6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1443151882.00000267270DA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1461262502.000002673577F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: powershell.exe, 00000001.00000002.1443151882.0000026726F90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: powershell.exe, 00000001.00000002.1443151882.0000026725701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: powershell.exe, 00000001.00000002.1443151882.0000026726DBC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: powershell.exe, 00000001.00000002.1443151882.0000026726F90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: powershell.exe, 00000001.00000002.1443151882.0000026725701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
Source: powershell.exe, 00000001.00000002.1461262502.000002673577F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000001.00000002.1461262502.000002673577F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000001.00000002.1461262502.000002673577F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: powershell.exe, 00000001.00000002.1443151882.0000026726F90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 00000001.00000002.1443151882.0000026726331000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
Source: powershell.exe, 00000001.00000002.1461262502.00000267358B6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1443151882.00000267270DA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1461262502.000002673577F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
Source: powershell.exe, 00000001.00000002.1443151882.0000026726DBC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
Source: powershell.exe, 00000001.00000002.1443151882.0000026726DBC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005AD2000_2_005AD200
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005E05400_2_005E0540
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005E79A00_2_005E79A0
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005D6A200_2_005D6A20
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005C9B200_2_005C9B20
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005C8D200_2_005C8D20
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005ADDA00_2_005ADDA0
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005B6EE00_2_005B6EE0
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005A1FE00_2_005A1FE0
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005BA0200_2_005BA020
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005EF1600_2_005EF160
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005E21800_2_005E2180
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005BF1A00_2_005BF1A0
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005DE2200_2_005DE220
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_0061C4600_2_0061C460
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005AA4400_2_005AA440
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_006054200_2_00605420
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005BB4800_2_005BB480
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005F24800_2_005F2480
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005DA5200_2_005DA520
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005CC6400_2_005CC640
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005C66200_2_005C6620
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005C36C00_2_005C36C0
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005FE7200_2_005FE720
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005D37C00_2_005D37C0
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005DD8C00_2_005DD8C0
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005F39400_2_005F3940
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005AE9600_2_005AE960
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005BB9A00_2_005BB9A0
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005D0A400_2_005D0A40
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005C7A600_2_005C7A60
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005EBA200_2_005EBA20
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005CDAC00_2_005CDAC0
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005B5AE00_2_005B5AE0
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_00607AA90_2_00607AA9
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005CCB000_2_005CCB00
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005A3BE00_2_005A3BE0
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005CFCC00_2_005CFCC0
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005D9CE00_2_005D9CE0
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_0061CC800_2_0061CC80
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005BADC00_2_005BADC0
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005C1DE00_2_005C1DE0
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005CEEA00_2_005CEEA0
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005E0FC00_2_005E0FC0
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFB4B4408CD1_2_00007FFB4B4408CD
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 4_2_000000F2811FDAFC4_2_000000F2811FDAFC
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: String function: 005D8F40 appears 516 times
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: String function: 005DB260 appears 632 times
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: String function: 005D9020 appears 33 times
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: String function: 005DAA40 appears 77 times
Source: 5yv6ZxNaTP.exeStatic PE information: Number of sections : 15 > 10
Source: 5yv6ZxNaTP.exeStatic PE information: Section: /19 ZLIB complexity 0.9984454719387755
Source: 5yv6ZxNaTP.exeStatic PE information: Section: /32 ZLIB complexity 0.9945591517857143
Source: 5yv6ZxNaTP.exeStatic PE information: Section: /65 ZLIB complexity 0.9997003573919108
Source: 5yv6ZxNaTP.exeStatic PE information: Section: /78 ZLIB complexity 0.9953365100472813
Source: classification engineClassification label: mal68.spre.evad.mine.winEXE@5/4@0/1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Nexus.lnkJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7772:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kooj2ijd.zhe.ps1Jump to behavior
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeFile opened: C:\Windows\system32\d99eaf317a9ec33d6509637d666926e68eaab03c2511222c0f2b281ff7d0249aAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJump to behavior
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeFile opened: C:\Windows\system32\c497275e86134e360c36ca4b6f11eba33017d3a8ad0955706fae76390eeee7e3AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJump to behavior
Source: 5yv6ZxNaTP.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 5yv6ZxNaTP.exeString found in binary or memory: /cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power
Source: 5yv6ZxNaTP.exeString found in binary or memory: /cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power
Source: 5yv6ZxNaTP.exeString found in binary or memory: runtime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:sec
Source: 5yv6ZxNaTP.exeString found in binary or memory: runtime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:sec
Source: 5yv6ZxNaTP.exeString found in binary or memory: concurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:sec
Source: 5yv6ZxNaTP.exeString found in binary or memory: concurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:sec
Source: 5yv6ZxNaTP.exeString found in binary or memory: /memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspin
Source: 5yv6ZxNaTP.exeString found in binary or memory: /memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspin
Source: 5yv6ZxNaTP.exeString found in binary or memory: /memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent loc
Source: 5yv6ZxNaTP.exeString found in binary or memory: /memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent loc
Source: 5yv6ZxNaTP.exeString found in binary or memory: /gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus old
Source: 5yv6ZxNaTP.exeString found in binary or memory: /gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus old
Source: 5yv6ZxNaTP.exeString found in binary or memory: /cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.ins
Source: 5yv6ZxNaTP.exeString found in binary or memory: /cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.ins
Source: 5yv6ZxNaTP.exeString found in binary or memory: /sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack
Source: 5yv6ZxNaTP.exeString found in binary or memory: /sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack
Source: 5yv6ZxNaTP.exeString found in binary or memory: ) is larger than maximum page size (runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime:
Source: 5yv6ZxNaTP.exeString found in binary or memory: ) is larger than maximum page size (runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime:
Source: 5yv6ZxNaTP.exeString found in binary or memory: lfstack node allocated from the heap) is larger than maximum page size (runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime:
Source: 5yv6ZxNaTP.exeString found in binary or memory: lfstack node allocated from the heap) is larger than maximum page size (runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime:
Source: 5yv6ZxNaTP.exeString found in binary or memory: /memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlineUnable to determine system directoryruntime:
Source: 5yv6ZxNaTP.exeString found in binary or memory: /memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlineUnable to determine system directoryruntime:
Source: 5yv6ZxNaTP.exeString found in binary or memory: uncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlineUnable t
Source: 5yv6ZxNaTP.exeString found in binary or memory: uncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlineUnable t
Source: 5yv6ZxNaTP.exeString found in binary or memory: runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime:
Source: 5yv6ZxNaTP.exeString found in binary or memory: runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime:
Source: 5yv6ZxNaTP.exeString found in binary or memory: /sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlineUnable to determine system directoryruntime: VirtualQuery failed; errno=runtime:
Source: 5yv6ZxNaTP.exeString found in binary or memory: /sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlineUnable to determine system directoryruntime: VirtualQuery failed; errno=runtime:
Source: 5yv6ZxNaTP.exeString found in binary or memory: unsafe.String: len out of range11368683772161602973937988281255684341886080801486968994140625zone must be a non-empty stringcannot assign requested address.lib section in a.out corruptedbufio: tried to fill full buffergo package net: hostLookupOrder(sync: Unlock of unlocked RWMutexsync: negative WaitGroup counterMapIter.Value called before Nextslice bounds out of range [::%x]slice bounds out of range [:%x:]slice bounds out of range [%x::] (types from different packages)end outside usable address spaceGCProg for type that isn't largeruntime: failed to release pagesruntime: fixalloc size too largeinvalid limiter event type foundscanstack: goroutine not stoppedscavenger state is already wiredsweep increased allocation countremovespecial on invalid pointerruntime: root level max pages = WSAGetOverlappedResult not found_cgo_pthread_key_created missingruntime: sudog with non-nil elemruntime: sudog with non-nil nextruntime: sudog with non-nil prevruntime: mcall function returnedruntime: newstack called from g=runtime: stack split at bad timepanic while printing panic valueruntime: setevent failed; errno=runtime.semasleep wait_abandoned28421709430404007434844970703125unexpected character, want colonresource temporarily unavailablesoftware caused connection abortnumerical argument out of domainCertAddCertificateContextToStoreCertVerifyCertificateChainPolicyuse of closed network connection" not supported for cpu option "Failed to read message length: %vFailed to get executable path: %vgo package net: confVal.netCgo = sync: RUnlock of unlocked RWMutexreflect: slice index out of range of method on nil interface valuereflect: Field index out of rangereflect: array index out of rangeslice bounds out of range [%x:%y]base outside usable address spaceruntime: memory allocated by OS [misrounded allocation in sysAllocconcurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack spanstackalloc not on scheduler stackruntime: goroutine stack exceeds runtime: text offset out of rangetimer period must be non-negativeruntime: name offset out of rangeruntime: type offset out of range142108547152020037174224853515625710542735760100185871124267578125skip everything and stop the walktoo many levels of symbolic linksInitializeProcThreadAttributeListtoo many Answers to pack (>65535)GetVolumeNameForVolumeMountPointWwaiting for unsupported file typeGODEBUG: no value specified for "Failed to connect to target %s: %vClosed connection for Stream ID %dNoDefaultCurrentDirectoryInExePathreflect: Field of non-struct type reflect: Field index out of boundsreflect: s
Source: 5yv6ZxNaTP.exeString found in binary or memory: unsafe.String: len out of range11368683772161602973937988281255684341886080801486968994140625zone must be a non-empty stringcannot assign requested address.lib section in a.out corruptedbufio: tried to fill full buffergo package net: hostLookupOrder(sync: Unlock of unlocked RWMutexsync: negative WaitGroup counterMapIter.Value called before Nextslice bounds out of range [::%x]slice bounds out of range [:%x:]slice bounds out of range [%x::] (types from different packages)end outside usable address spaceGCProg for type that isn't largeruntime: failed to release pagesruntime: fixalloc size too largeinvalid limiter event type foundscanstack: goroutine not stoppedscavenger state is already wiredsweep increased allocation countremovespecial on invalid pointerruntime: root level max pages = WSAGetOverlappedResult not found_cgo_pthread_key_created missingruntime: sudog with non-nil elemruntime: sudog with non-nil nextruntime: sudog with non-nil prevruntime: mcall function returnedruntime: newstack called from g=runtime: stack split at bad timepanic while printing panic valueruntime: setevent failed; errno=runtime.semasleep wait_abandoned28421709430404007434844970703125unexpected character, want colonresource temporarily unavailablesoftware caused connection abortnumerical argument out of domainCertAddCertificateContextToStoreCertVerifyCertificateChainPolicyuse of closed network connection" not supported for cpu option "Failed to read message length: %vFailed to get executable path: %vgo package net: confVal.netCgo = sync: RUnlock of unlocked RWMutexreflect: slice index out of range of method on nil interface valuereflect: Field index out of rangereflect: array index out of rangeslice bounds out of range [%x:%y]base outside usable address spaceruntime: memory allocated by OS [misrounded allocation in sysAllocconcurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack spanstackalloc not on scheduler stackruntime: goroutine stack exceeds runtime: text offset out of rangetimer period must be non-negativeruntime: name offset out of rangeruntime: type offset out of range142108547152020037174224853515625710542735760100185871124267578125skip everything and stop the walktoo many levels of symbolic linksInitializeProcThreadAttributeListtoo many Answers to pack (>65535)GetVolumeNameForVolumeMountPointWwaiting for unsupported file typeGODEBUG: no value specified for "Failed to connect to target %s: %vClosed connection for Stream ID %dNoDefaultCurrentDirectoryInExePathreflect: Field of non-struct type reflect: Field index out of boundsreflect: s
Source: 5yv6ZxNaTP.exeString found in binary or memory: C:/Program Files/Go/src/net/addrselect.go
Source: unknownProcess created: C:\Users\user\Desktop\5yv6ZxNaTP.exe "C:\Users\user\Desktop\5yv6ZxNaTP.exe"
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command "$ws = New-Object -ComObject WScript.Shell; $s = $ws.CreateShortcut('C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Nexus.lnk'); $s.TargetPath = 'C:\Users\user\Desktop\5yv6ZxNaTP.exe'; $s.Save()"
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Users\user\Desktop\5yv6ZxNaTP.exe "C:\Users\user\Desktop\5yv6ZxNaTP.exe"
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command "$ws = New-Object -ComObject WScript.Shell; $s = $ws.CreateShortcut('C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Nexus.lnk'); $s.TargetPath = 'C:\Users\user\Desktop\5yv6ZxNaTP.exe'; $s.Save()"Jump to behavior
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeSection loaded: mswsock.dllJump to behavior
Source: Nexus.lnk.1.drLNK file: ..\..\..\..\..\..\..\Desktop\5yv6ZxNaTP.exe
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: 5yv6ZxNaTP.exeStatic file information: File size 3255296 > 1048576
Source: 5yv6ZxNaTP.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x112000
Source: 5yv6ZxNaTP.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: 5yv6ZxNaTP.exeStatic PE information: section name: .xdata
Source: 5yv6ZxNaTP.exeStatic PE information: section name: /4
Source: 5yv6ZxNaTP.exeStatic PE information: section name: /19
Source: 5yv6ZxNaTP.exeStatic PE information: section name: /32
Source: 5yv6ZxNaTP.exeStatic PE information: section name: /46
Source: 5yv6ZxNaTP.exeStatic PE information: section name: /65
Source: 5yv6ZxNaTP.exeStatic PE information: section name: /78
Source: 5yv6ZxNaTP.exeStatic PE information: section name: /90
Source: 5yv6ZxNaTP.exeStatic PE information: section name: .symtab
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 4_2_000000F2811FFE1A push ebp; retf 4_2_000000F2811FFE2B
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 4_2_000000F2811FE248 push ecx; retf 4_2_000000F2811FE329
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 4_2_000000F2811FF271 push edi; retf 4_2_000000F2811FF34B
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 4_2_000000F2811FFE38 push ebp; retf 4_2_000000F2811FFE3B
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 4_2_000000F2811FD8E8 push ecx; retf 4_2_000000F2811FD949
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 4_2_000000F2811FFE02 push ebp; retf 4_2_000000F2811FFE13

Boot Survival

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: .lnk'); $s.TargetPath = 'C:\Users\user\Desktop\5yv6ZxNaTP.exe'; $s.Save()@{# Script module or binary module file associated with this manifest.ModuleToProcess = 'Pester.psm1'# Version number of this module.ModuleVersion = '3.4.0'# ID used to uniquely identify this moduleGUID = 'a699dea5-2c73-4616-a270-1f7abb777e71'# Author of this moduleAuthor = 'Pester Team'# Company or vendor of this moduleCompanyName = 'Pester'# Copyright statement for this moduleCopyright = 'Copyright (c) 2016 by Pester Team, licensed under Apache 2.0 License.'# Description of the functionality provided by this moduleDescription = 'Pester provides a framework for running BDD style Tests to execute and validate PowerShell commands inside of PowerShell and offers a powerful set of Mocking Functions that allow tests to mimic and mock the functionality of any command inside of a piece of powershell code being tested. Pester tests can execute any command or script that is accesible to a pester test file. This can include functions, Cmdlets, Modules and scripts. Pester can be run in ad hoc style in a console or it can be integrated into the Build scripts of a Continuous Integration system.'# Minimum version of the Windows PowerShell engine required by this modulePowerShellVersion = '2.0'# Functions to export from this moduleFunctionsToExport = @( 'Describe', 'Context', 'It', 'Should', 'Mock', 'Assert-MockCalled', 'Assert-VerifiableMocks', 'New-Fixture', 'Get-TestDriveItem', 'Invoke-Pester', 'Setup', 'In', 'InModuleScope', 'Invoke-Mock', 'BeforeEach', 'AfterEach', 'BeforeAll', 'AfterAll' 'Get-MockDynamicParameters', 'Set-DynamicParameterVariables', 'Set-TestInconclusive', 'SafeGetCommand', 'New-PesterOption')# # Cmdlets to export from this module# CmdletsToExport = '*'# Variables to export from this moduleVariablesToExport = @( 'Path', 'TagFilter', 'ExcludeTagFilter', 'TestNameFilter', 'TestResult', 'CurrentContext', 'CurrentDescribe', 'CurrentTest', 'SessionState', 'CommandCoverage', 'BeforeEach', 'AfterEach', 'Strict')# # Aliases to export from this module# AliasesToExport = '*'# List of all modules packaged with this module# ModuleList = @()# List of all files packaged with this module# FileList = @()PrivateData = @{ # PSData is module packaging and gallery metadata embedded in PrivateData # It's for rebuilding PowerShellGet (and PoshCode) NuGet-style packages # We had to do this because it's the only place we're allowed to extend the manifest # https://connect.microsoft.com/PowerShell/feedback/details/421837 PSData = @{ # The primary categorization of this module (from the TechNet Gallery tech tree). Category = "Scripting Techniques" # Keyword tags to help users find this module via navigations and search. Tags = @('powershell','unit testing','bdd','tdd','mocking') # The web address of an icon which can be used in galler
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Nexus.lnkJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Nexus.lnkJump to behavior
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_0060A800 rdtscp0_2_0060A800
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2876Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3664Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7976Thread sleep time: -1844674407370954s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7864Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_005D4940 GetProcessAffinityMask,GetSystemInfo,0_2_005D4940
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: powershell.exe, 00000001.00000002.1465103864.000002673D9A1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}v
Source: 5yv6ZxNaTP.exe, 00000000.00000002.2675712059.000002227DE54000.00000004.00000020.00020000.00000000.sdmp, 5yv6ZxNaTP.exe, 00000004.00000002.2675613804.0000027639FF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: powershell.exe, 00000001.00000002.1465103864.000002673D9A1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\8b}\
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_0060A800 Start: 0060A809 End: 0060A81F0_2_0060A800
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeCode function: 0_2_0060A800 rdtscp0_2_0060A800
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\5yv6ZxNaTP.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command "$ws = New-Object -ComObject WScript.Shell; $s = $ws.CreateShortcut('C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Nexus.lnk'); $s.TargetPath = 'C:\Users\user\Desktop\5yv6ZxNaTP.exe'; $s.Save()"Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
12
Registry Run Keys / Startup Folder
11
Process Injection
1
Masquerading
OS Credential Dumping11
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
PowerShell
1
DLL Side-Loading
12
Registry Run Keys / Startup Folder
21
Virtualization/Sandbox Evasion
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
11
Process Injection
Security Account Manager21
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
Obfuscated Files or Information
LSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Software Packing
Cached Domain Credentials12
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
5yv6ZxNaTP.exe8%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://nuget.org/NuGet.exe0%URL Reputationsafe
http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
https://go.micro0%URL Reputationsafe
https://contoso.com/0%URL Reputationsafe
https://nuget.org/nuget.exe0%URL Reputationsafe
https://contoso.com/License0%URL Reputationsafe
https://contoso.com/Icon0%URL Reputationsafe
https://oneget.orgX0%URL Reputationsafe
https://aka.ms/pscore680%URL Reputationsafe
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
https://oneget.org0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.1461262502.00000267358B6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1443151882.00000267270DA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1461262502.000002673577F000.00000004.00000800.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000001.00000002.1443151882.0000026726DBC000.00000004.00000800.00020000.00000000.sdmptrue
    unknown
    http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000001.00000002.1443151882.0000026726F90000.00000004.00000800.00020000.00000000.sdmptrue
    • URL Reputation: safe
    unknown
    http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000001.00000002.1443151882.0000026726F90000.00000004.00000800.00020000.00000000.sdmptrue
      unknown
      https://go.micropowershell.exe, 00000001.00000002.1443151882.0000026726331000.00000004.00000800.00020000.00000000.sdmptrue
      • URL Reputation: safe
      unknown
      https://contoso.com/powershell.exe, 00000001.00000002.1461262502.000002673577F000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.1461262502.00000267358B6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1443151882.00000267270DA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1461262502.000002673577F000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://contoso.com/Licensepowershell.exe, 00000001.00000002.1461262502.000002673577F000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://contoso.com/Iconpowershell.exe, 00000001.00000002.1461262502.000002673577F000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://oneget.orgXpowershell.exe, 00000001.00000002.1443151882.0000026726DBC000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://aka.ms/pscore68powershell.exe, 00000001.00000002.1443151882.0000026725701000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.1443151882.0000026725701000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://github.com/Pester/Pesterpowershell.exe, 00000001.00000002.1443151882.0000026726F90000.00000004.00000800.00020000.00000000.sdmptrue
        unknown
        https://oneget.orgpowershell.exe, 00000001.00000002.1443151882.0000026726DBC000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        185.196.10.218
        unknownSwitzerland
        42624SIMPLECARRIERCHfalse
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1546425
        Start date and time:2024-10-31 21:41:11 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 5m 25s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:9
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:5yv6ZxNaTP.exe
        renamed because original name is a hash value
        Original Sample Name:121222d12d96665d88f8e60a419329f0.exe
        Detection:MAL
        Classification:mal68.spre.evad.mine.winEXE@5/4@0/1
        EGA Information:
        • Successful, ratio: 33.3%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 15
        • Number of non-executed functions: 39
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Execution Graph export aborted for target 5yv6ZxNaTP.exe, PID 8076 because there are no executed function
        • Execution Graph export aborted for target powershell.exe, PID 7764 because it is empty
        • Not all processes where analyzed, report is missing behavior information
        • VT rate limit hit for: 5yv6ZxNaTP.exe
        TimeTypeDescription
        16:42:11API Interceptor5x Sleep call for process: powershell.exe modified
        21:42:13AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Nexus.lnk
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        185.196.10.218file.exeGet hashmaliciousUnknownBrowse
          file.exeGet hashmaliciousUnknownBrowse
            file.exeGet hashmaliciousUnknownBrowse
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              SIMPLECARRIERCHfile.exeGet hashmaliciousUnknownBrowse
              • 185.196.10.218
              file.exeGet hashmaliciousUnknownBrowse
              • 185.196.10.218
              file.exeGet hashmaliciousUnknownBrowse
              • 185.196.10.218
              sipari_.exeGet hashmaliciousAgentTeslaBrowse
              • 185.196.9.150
              UGcjMkPWwW.exeGet hashmaliciousRHADAMANTHYSBrowse
              • 185.196.11.237
              x86_64.bin.elfGet hashmaliciousUnknownBrowse
              • 185.196.10.215
              fEv4R2ahiLCQa5O.exeGet hashmaliciousAgentTeslaBrowse
              • 185.196.9.150
              PW68YarHboeikgM.exeGet hashmaliciousAgentTeslaBrowse
              • 185.196.9.150
              IND24072113.xlsxGet hashmaliciousUnknownBrowse
              • 185.196.10.234
              SecuriteInfo.com.Win32.MalwareX-gen.30759.2179.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
              • 185.196.9.150
              No context
              No context
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:data
              Category:dropped
              Size (bytes):64
              Entropy (8bit):1.1940658735648508
              Encrypted:false
              SSDEEP:3:NlllulDm0ll//Z:NllU6cl/
              MD5:DA1F22117B9766A1F0220503765A5BA5
              SHA1:D35597157EFE03AA1A88C1834DF8040B3DD3F3CB
              SHA-256:BD022BFCBE39B4DA088DDE302258AE375AAFD6BDA4C7B39A97D80C8F92981C69
              SHA-512:520FA7879AB2A00C86D9982BB057E7D5E243F7FC15A12BA1C823901DC582D2444C76534E955413B0310B9EBD043400907FD412B88927DAD07A1278D3B667E3D9
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview:@...e.................................R..............@..........
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):60
              Entropy (8bit):4.038920595031593
              Encrypted:false
              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
              MD5:D17FE0A3F47BE24A6453E9EF58C94641
              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
              Malicious:false
              Reputation:high, very likely benign file
              Preview:# PowerShell test file to determine AppLocker lockdown mode
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):60
              Entropy (8bit):4.038920595031593
              Encrypted:false
              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
              MD5:D17FE0A3F47BE24A6453E9EF58C94641
              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
              Malicious:false
              Reputation:high, very likely benign file
              Preview:# PowerShell test file to determine AppLocker lockdown mode
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Oct 5 07:36:25 2023, mtime=Thu Oct 31 19:42:11 2024, atime=Thu Oct 31 19:42:08 2024, length=3255296, window=hide
              Category:dropped
              Size (bytes):606
              Entropy (8bit):5.10965313185072
              Encrypted:false
              SSDEEP:12:8hZM1qzYNbRnPPpZFohKE2jEjA/sGRRcuq9hgImV:8hyTnnPPpZfE2UA/hR3q9hgIm
              MD5:11E79E18119F4CBC323EA78CD411FFA3
              SHA1:A99E297EC4066E6B69BEAB5C63FD1DB4E4605141
              SHA-256:12C3FACB4940E9CDC1A331419ABD0743A87EC0DDDD6D17BD7DC2E85110788460
              SHA-512:6F92E73DD8DD376AB54FDD8873EBBA279A3E59B30D3F63E8448FD69A416D45F340EC076A55FDF5AF7F4B7608806A2505EF756D48CD25199BC2AC91670871FEDE
              Malicious:true
              Preview:L..................F.... ...3B8.g......\.+..)..Z.+....1..........................P.O. .:i.....+00.:...:..,.LB.)...A&...&.........Yd...ji..g......\.+....j.2...1._YE. .5YV6ZX~1.EXE..N......EW.D_YE......T.......................5.y.v.6.Z.x.N.a.T.P...e.x.e.......U...............-.......T...........(.U......C:\Users\user\Desktop\5yv6ZxNaTP.exe..+.....\.....\.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.5.y.v.6.Z.x.N.a.T.P...e.x.e.`.......X.......226533...........hT..CrF.f4... ..E..Yc...,...E...hT..CrF.f4... ..E..Yc...,...E..E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
              File type:PE32+ executable (GUI) x86-64, for MS Windows
              Entropy (8bit):6.8489982564228065
              TrID:
              • Win64 Executable GUI (202006/5) 92.65%
              • Win64 Executable (generic) (12005/4) 5.51%
              • Generic Win/DOS Executable (2004/3) 0.92%
              • DOS Executable Generic (2002/1) 0.92%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:5yv6ZxNaTP.exe
              File size:3'255'296 bytes
              MD5:121222d12d96665d88f8e60a419329f0
              SHA1:51ed963231e60e1b6bcbbf81f325184f4a314beb
              SHA256:1fcc27fc5d5ab23eb89fecedaf7c036fa5d9fee5854868dcc0b98d2023fbdb2c
              SHA512:b35d227b3f45c1397a5b143c5a24dc602bd2bb557ecaadd5940f9b0af957fb5e987478baeafa254123ba2d2d62eb713df6aa995d7ef277fc27ea7acb97a0ab71
              SSDEEP:49152:Tu4q74iE3izWReSVYlI4vvn94SHlJ91fE6G3w:IBELRqJw
              TLSH:1BE58E57BC9508A9D4A9A33189A652937B76BC490F3223D36F60F33C2F76BD09979310
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........l/.i....."...........................@...............................:...........`... ............................
              Icon Hash:00928e8e8686b000
              Entrypoint:0x46bf80
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:6
              OS Version Minor:1
              File Version Major:6
              File Version Minor:1
              Subsystem Version Major:6
              Subsystem Version Minor:1
              Import Hash:c2d457ad8ac36fc9f18d45bffcd450c2
              Instruction
              jmp 00007FA110CD8E30h
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              push ebp
              dec eax
              mov ebp, esp
              pushfd
              cld
              dec eax
              sub esp, 000000E0h
              dec eax
              mov dword ptr [esp], edi
              dec eax
              mov dword ptr [esp+08h], esi
              dec eax
              mov dword ptr [esp+10h], ebp
              dec eax
              mov dword ptr [esp+18h], ebx
              dec esp
              mov dword ptr [esp+20h], esp
              dec esp
              mov dword ptr [esp+28h], ebp
              dec esp
              mov dword ptr [esp+30h], esi
              dec esp
              mov dword ptr [esp+38h], edi
              movups dqword ptr [esp+40h], xmm6
              movups dqword ptr [esp+50h], xmm7
              inc esp
              movups dqword ptr [esp+60h], xmm0
              inc esp
              movups dqword ptr [esp+70h], xmm1
              inc esp
              movups dqword ptr [esp+00000080h], xmm2
              inc esp
              movups dqword ptr [esp+00000090h], xmm3
              inc esp
              movups dqword ptr [esp+000000A0h], xmm4
              inc esp
              movups dqword ptr [esp+000000B0h], xmm5
              inc esp
              movups dqword ptr [esp+000000C0h], xmm6
              inc esp
              movups dqword ptr [esp+000000D0h], xmm7
              inc ebp
              xorps xmm7, xmm7
              dec ebp
              xor esi, esi
              dec eax
              mov eax, dword ptr [00229202h]
              dec eax
              mov eax, dword ptr [eax]
              dec eax
              cmp eax, 00000000h
              je 00007FA110CDC715h
              dec esp
              mov esi, dword ptr [eax]
              dec eax
              sub esp, 10h
              dec eax
              mov eax, ecx
              dec eax
              mov ebx, edx
              call 00007FA110CDE80Bh
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x3800000x554.idata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x2990000x6abc.pdata
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x3810000x4f46.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x2001000x180.data
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000xec3be0xec400d90c021d10428169e6bf2ee3ae77b428False0.4619088955026455data6.197180912933258IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rdata0xee0000x111e880x1120001deff442e960c5585d5c78c81dc98944False0.4076489079607664data5.413398604478663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .data0x2000000x98d000xfc00209b5a6f3d7c81e34a85592649145ec3False0.3759765625data3.8948674422655625IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .pdata0x2990000x6abc0x6c007c73081b839175441f6530ec8e4bb7dbFalse0.39579716435185186data5.021276623612626IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .xdata0x2a00000xb40x200168200dcfbbfe2f110cfcd239b02e02cFalse0.2265625shared library1.787112262798912IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              /40x2a10000x1290x20017f62672c8506464ae13eccc2eb6cb94False0.623046875data5.081946473254993IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /190x2a20000x30e500x31000a8bd9d213d0d02e475d4ba24baad2381False0.9984454719387755data7.995397489621077IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /320x2d30000xa78c0xa800d39f8eccfa305e8f7ac9c27925c3832cFalse0.9945591517857143data7.927815340947501IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /460x2de0000x300x20040cca7c46fc713b4f088e5d440ca7931False0.103515625data0.8556848540171443IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /650x2df0000x598ff0x59a003cdc7ff8a582210e331182b5863195c2False0.9997003573919108data7.998038714109929IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /780x3390000x34cd20x34e003410cf04c1bee7f6dc879dac5a25d73eFalse0.9953365100472813data7.992547884111423IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /900x36e0000x11cd40x11e002f31c072746f0711cf34450cf828cecdFalse0.9732708697552448data7.803217541460137IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              .idata0x3800000x5540x6009019caff4a889656c39bded7c080bd75False0.380859375data3.9866303467640605IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .reloc0x3810000x4f460x50004f662718fc0dc77773bc41a73258f631False0.3177734375data5.430280365870681IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              .symtab0x3860000x23f0b0x24000f954f869a86ee6475798b59d75def54cFalse0.2531263563368056data5.100166500840262IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              DLLImport
              kernel32.dllWriteFile, WriteConsoleW, WerSetFlags, WerGetFlags, WaitForMultipleObjects, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, TlsAlloc, SwitchToThread, SuspendThread, SetWaitableTimer, SetProcessPriorityBoost, SetEvent, SetErrorMode, SetConsoleCtrlHandler, RtlVirtualUnwind, RtlLookupFunctionEntry, ResumeThread, RaiseFailFastException, PostQueuedCompletionStatus, LoadLibraryW, LoadLibraryExW, SetThreadContext, GetThreadContext, GetSystemInfo, GetSystemDirectoryA, GetStdHandle, GetQueuedCompletionStatusEx, GetProcessAffinityMask, GetProcAddress, GetErrorMode, GetEnvironmentStringsW, GetCurrentThreadId, GetConsoleMode, FreeEnvironmentStringsW, ExitProcess, DuplicateHandle, CreateWaitableTimerExW, CreateThread, CreateIoCompletionPort, CreateFileA, CreateEventA, CloseHandle, AddVectoredExceptionHandler, AddVectoredContinueHandler
              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
              2024-10-31T21:42:28.628320+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.109.210.53443192.168.2.849708TCP
              2024-10-31T21:43:06.981805+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.109.210.53443192.168.2.849720TCP
              TimestampSource PortDest PortSource IPDest IP
              Oct 31, 2024 21:42:16.116893053 CET497059889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:16.121819019 CET988949705185.196.10.218192.168.2.8
              Oct 31, 2024 21:42:16.121933937 CET497059889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:23.564796925 CET497069889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:23.889091015 CET988949706185.196.10.218192.168.2.8
              Oct 31, 2024 21:42:23.889230013 CET497069889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:24.614007950 CET988949705185.196.10.218192.168.2.8
              Oct 31, 2024 21:42:24.614109993 CET497059889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:24.614337921 CET497059889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:24.615305901 CET497079889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:24.619251013 CET988949705185.196.10.218192.168.2.8
              Oct 31, 2024 21:42:24.620107889 CET988949707185.196.10.218192.168.2.8
              Oct 31, 2024 21:42:24.620182991 CET497079889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:32.380167961 CET988949706185.196.10.218192.168.2.8
              Oct 31, 2024 21:42:32.380286932 CET497069889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:32.380532026 CET497069889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:32.380677938 CET497129889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:32.385808945 CET988949706185.196.10.218192.168.2.8
              Oct 31, 2024 21:42:32.385857105 CET988949712185.196.10.218192.168.2.8
              Oct 31, 2024 21:42:32.385947943 CET497129889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:33.130424023 CET988949707185.196.10.218192.168.2.8
              Oct 31, 2024 21:42:33.130605936 CET497079889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:33.130640030 CET497079889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:33.130872011 CET497139889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:33.135756969 CET988949707185.196.10.218192.168.2.8
              Oct 31, 2024 21:42:33.136095047 CET988949713185.196.10.218192.168.2.8
              Oct 31, 2024 21:42:33.136173964 CET497139889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:40.870146036 CET988949712185.196.10.218192.168.2.8
              Oct 31, 2024 21:42:40.870212078 CET497129889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:40.870318890 CET497129889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:40.871403933 CET497149889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:40.875176907 CET988949712185.196.10.218192.168.2.8
              Oct 31, 2024 21:42:40.876230001 CET988949714185.196.10.218192.168.2.8
              Oct 31, 2024 21:42:40.876291990 CET497149889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:41.857737064 CET988949713185.196.10.218192.168.2.8
              Oct 31, 2024 21:42:41.857800007 CET497139889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:41.857928991 CET497139889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:41.858197927 CET497159889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:41.858326912 CET988949713185.196.10.218192.168.2.8
              Oct 31, 2024 21:42:41.858362913 CET497139889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:41.862689018 CET988949713185.196.10.218192.168.2.8
              Oct 31, 2024 21:42:41.863070011 CET988949715185.196.10.218192.168.2.8
              Oct 31, 2024 21:42:41.863140106 CET497159889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:49.384553909 CET988949714185.196.10.218192.168.2.8
              Oct 31, 2024 21:42:49.384670973 CET497149889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:49.384897947 CET497149889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:49.385092020 CET497169889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:49.390393019 CET988949714185.196.10.218192.168.2.8
              Oct 31, 2024 21:42:49.390418053 CET988949716185.196.10.218192.168.2.8
              Oct 31, 2024 21:42:49.390500069 CET497169889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:50.352288008 CET988949715185.196.10.218192.168.2.8
              Oct 31, 2024 21:42:50.352374077 CET497159889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:50.352509022 CET497159889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:50.352777958 CET497179889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:50.357418060 CET988949715185.196.10.218192.168.2.8
              Oct 31, 2024 21:42:50.358022928 CET988949717185.196.10.218192.168.2.8
              Oct 31, 2024 21:42:50.358108044 CET497179889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:57.898375988 CET988949716185.196.10.218192.168.2.8
              Oct 31, 2024 21:42:57.898478031 CET497169889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:57.898943901 CET497169889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:57.899133921 CET497189889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:57.903934002 CET988949716185.196.10.218192.168.2.8
              Oct 31, 2024 21:42:57.906897068 CET988949718185.196.10.218192.168.2.8
              Oct 31, 2024 21:42:57.906975985 CET497189889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:58.863070965 CET988949717185.196.10.218192.168.2.8
              Oct 31, 2024 21:42:58.863143921 CET497179889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:58.863254070 CET497179889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:58.863514900 CET497199889192.168.2.8185.196.10.218
              Oct 31, 2024 21:42:58.868763924 CET988949717185.196.10.218192.168.2.8
              Oct 31, 2024 21:42:58.868772030 CET988949719185.196.10.218192.168.2.8
              Oct 31, 2024 21:42:58.868835926 CET497199889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:06.422827005 CET988949718185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:06.422915936 CET497189889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:06.423175097 CET497189889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:06.423337936 CET497219889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:06.428031921 CET988949718185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:06.428344965 CET988949721185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:06.428523064 CET497219889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:07.375658035 CET988949719185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:07.375724077 CET497199889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:07.375906944 CET497199889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:07.376081944 CET497229889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:07.380740881 CET988949719185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:07.380968094 CET988949722185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:07.381053925 CET497229889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:14.921108007 CET988949721185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:14.921449900 CET497219889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:14.921498060 CET497219889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:14.921725988 CET497239889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:14.926661015 CET988949721185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:14.927397013 CET988949723185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:14.927491903 CET497239889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:16.226818085 CET988949722185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:16.226938963 CET497229889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:16.227519035 CET988949722185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:16.227574110 CET497229889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:16.227957010 CET497249889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:16.227984905 CET497229889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:16.233004093 CET988949722185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:16.233016014 CET988949724185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:16.233119011 CET497249889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:23.425211906 CET988949723185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:23.425343990 CET497239889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:23.425714970 CET497259889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:23.425736904 CET497239889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:23.430608988 CET988949723185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:23.430695057 CET988949725185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:23.430756092 CET497259889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:24.726280928 CET988949724185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:24.726471901 CET497249889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:24.726613045 CET497249889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:24.726897001 CET497269889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:24.731416941 CET988949724185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:24.731702089 CET988949726185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:24.731762886 CET497269889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:31.913377047 CET988949725185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:31.913476944 CET497259889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:31.914263010 CET497299889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:31.914300919 CET497259889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:31.920003891 CET988949725185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:31.920017958 CET988949729185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:31.920103073 CET497299889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:33.223726034 CET988949726185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:33.223836899 CET497269889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:33.228503942 CET497269889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:33.228811026 CET497309889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:33.233450890 CET988949726185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:33.233624935 CET988949730185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:33.233690023 CET497309889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:40.426645994 CET988949729185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:40.426805973 CET497299889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:40.426938057 CET497299889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:40.427146912 CET497319889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:40.431945086 CET988949729185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:40.432081938 CET988949731185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:40.432152987 CET497319889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:41.728425026 CET988949730185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:41.728514910 CET497309889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:41.728612900 CET497309889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:41.728910923 CET497329889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:41.734602928 CET988949730185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:41.734641075 CET988949732185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:41.734705925 CET497329889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:48.916129112 CET988949731185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:48.916178942 CET497319889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:48.916290998 CET497319889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:48.916651011 CET497339889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:48.921427965 CET988949731185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:48.921439886 CET988949733185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:48.921493053 CET497339889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:50.220163107 CET988949732185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:50.220237970 CET497329889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:50.220463991 CET497329889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:50.220608950 CET497349889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:50.225198030 CET988949732185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:50.225332022 CET988949734185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:50.225394964 CET497349889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:57.840578079 CET988949733185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:57.842861891 CET497339889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:57.842998981 CET497339889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:57.843231916 CET497359889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:57.847913027 CET988949733185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:57.851560116 CET988949735185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:57.854906082 CET497359889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:58.732387066 CET988949734185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:58.732459068 CET497349889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:58.732721090 CET497349889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:58.732830048 CET497369889192.168.2.8185.196.10.218
              Oct 31, 2024 21:43:58.737879038 CET988949734185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:58.737915039 CET988949736185.196.10.218192.168.2.8
              Oct 31, 2024 21:43:58.738003016 CET497369889192.168.2.8185.196.10.218
              Oct 31, 2024 21:44:06.364211082 CET988949735185.196.10.218192.168.2.8
              Oct 31, 2024 21:44:06.364316940 CET497359889192.168.2.8185.196.10.218
              Oct 31, 2024 21:44:06.364484072 CET497359889192.168.2.8185.196.10.218
              Oct 31, 2024 21:44:06.364727020 CET497379889192.168.2.8185.196.10.218
              Oct 31, 2024 21:44:06.369496107 CET988949735185.196.10.218192.168.2.8
              Oct 31, 2024 21:44:06.369575024 CET988949737185.196.10.218192.168.2.8
              Oct 31, 2024 21:44:06.369643927 CET497379889192.168.2.8185.196.10.218
              Oct 31, 2024 21:44:07.224646091 CET988949736185.196.10.218192.168.2.8
              Oct 31, 2024 21:44:07.224720001 CET497369889192.168.2.8185.196.10.218
              Oct 31, 2024 21:44:07.224901915 CET497369889192.168.2.8185.196.10.218
              Oct 31, 2024 21:44:07.225148916 CET497389889192.168.2.8185.196.10.218
              Oct 31, 2024 21:44:07.229731083 CET988949736185.196.10.218192.168.2.8
              Oct 31, 2024 21:44:07.229968071 CET988949738185.196.10.218192.168.2.8
              Oct 31, 2024 21:44:07.230024099 CET497389889192.168.2.8185.196.10.218
              Oct 31, 2024 21:44:14.876935959 CET988949737185.196.10.218192.168.2.8
              Oct 31, 2024 21:44:14.878878117 CET497379889192.168.2.8185.196.10.218
              Oct 31, 2024 21:44:14.879899979 CET497379889192.168.2.8185.196.10.218
              Oct 31, 2024 21:44:14.880342960 CET497399889192.168.2.8185.196.10.218
              Oct 31, 2024 21:44:14.884680033 CET988949737185.196.10.218192.168.2.8
              Oct 31, 2024 21:44:14.885768890 CET988949739185.196.10.218192.168.2.8
              Oct 31, 2024 21:44:14.886253119 CET497399889192.168.2.8185.196.10.218
              Oct 31, 2024 21:44:15.720231056 CET988949738185.196.10.218192.168.2.8
              Oct 31, 2024 21:44:15.720343113 CET497389889192.168.2.8185.196.10.218
              Oct 31, 2024 21:44:15.720474005 CET497389889192.168.2.8185.196.10.218
              Oct 31, 2024 21:44:15.720688105 CET497409889192.168.2.8185.196.10.218
              Oct 31, 2024 21:44:15.725419044 CET988949738185.196.10.218192.168.2.8
              Oct 31, 2024 21:44:15.725503922 CET988949740185.196.10.218192.168.2.8
              Oct 31, 2024 21:44:15.725573063 CET497409889192.168.2.8185.196.10.218

              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:16:42:09
              Start date:31/10/2024
              Path:C:\Users\user\Desktop\5yv6ZxNaTP.exe
              Wow64 process (32bit):false
              Commandline:"C:\Users\user\Desktop\5yv6ZxNaTP.exe"
              Imagebase:0x5a0000
              File size:3'255'296 bytes
              MD5 hash:121222D12D96665D88F8E60A419329F0
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:Go lang
              Reputation:low
              Has exited:false

              Target ID:1
              Start time:16:42:09
              Start date:31/10/2024
              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              Wow64 process (32bit):false
              Commandline:powershell -Command "$ws = New-Object -ComObject WScript.Shell; $s = $ws.CreateShortcut('C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Nexus.lnk'); $s.TargetPath = 'C:\Users\user\Desktop\5yv6ZxNaTP.exe'; $s.Save()"
              Imagebase:0x7ff6cb6b0000
              File size:452'608 bytes
              MD5 hash:04029E121A0CFA5991749937DD22A1D9
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:2
              Start time:16:42:09
              Start date:31/10/2024
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff6ee680000
              File size:862'208 bytes
              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:4
              Start time:16:42:22
              Start date:31/10/2024
              Path:C:\Users\user\Desktop\5yv6ZxNaTP.exe
              Wow64 process (32bit):false
              Commandline:"C:\Users\user\Desktop\5yv6ZxNaTP.exe"
              Imagebase:0x5a0000
              File size:3'255'296 bytes
              MD5 hash:121222D12D96665D88F8E60A419329F0
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:Go lang
              Reputation:low
              Has exited:false

              Reset < >

                Execution Graph

                Execution Coverage:1.2%
                Dynamic/Decrypted Code Coverage:0%
                Signature Coverage:21.8%
                Total number of Nodes:762
                Total number of Limit Nodes:62
                execution_graph 44125 6088c0 44126 6088f4 44125->44126 44127 6088ef 44125->44127 44134 5e31e0 44126->44134 44148 5dc340 WSARecv 44127->44148 44135 5e31ea 44134->44135 44135->44134 44174 5dd8c0 WSARecv 44135->44174 44137 5e3238 44142 5e3265 44137->44142 44175 5fb340 WSARecv 44137->44175 44138 5e33c7 44160 5e2d40 44138->44160 44142->44138 44176 5dd8c0 WSARecv 44142->44176 44144 5e335d 44145 5e337b 44144->44145 44177 5fb480 WSARecv 44144->44177 44150 5e0e00 44145->44150 44149 5dc380 WSARecv 44151 5e0e0a 44150->44151 44151->44150 44153 5e0e39 44151->44153 44178 5d1120 WSARecv 44151->44178 44179 5dd8c0 WSARecv 44153->44179 44155 5e0e9b 44157 5e0ef3 44155->44157 44180 5d6940 WSARecv 44155->44180 44159 5e0f25 44157->44159 44181 5fb040 WSARecv 44157->44181 44159->44138 44172 5e2d4a 44160->44172 44162 5d8f40 WSARecv 44162->44172 44164 5e0e00 WSARecv 44164->44172 44165 5ac560 WSARecv 44165->44172 44168 5e2f77 44169 5e0e00 WSARecv 44168->44169 44171 5e2f7c 44169->44171 44171->44149 44172->44160 44172->44162 44172->44164 44172->44165 44172->44168 44173 5ac7c0 WSARecv 44172->44173 44182 5e09e0 44172->44182 44198 5e2980 44172->44198 44204 5e0c60 WSARecv 44172->44204 44205 5e0fc0 WSARecv 44172->44205 44206 5e08a0 44172->44206 44173->44172 44174->44137 44175->44142 44176->44144 44177->44145 44178->44153 44179->44155 44180->44157 44181->44159 44190 5e09ea 44182->44190 44187 5e0a8a 44274 5e70c0 WSARecv 44187->44274 44189 5e0a9a 44189->44172 44190->44182 44190->44187 44191 5db260 WSARecv 44190->44191 44192 5db1e0 WSARecv 44190->44192 44193 5dafa0 WSARecv 44190->44193 44194 5dac20 WSARecv 44190->44194 44195 5da9e0 WSARecv 44190->44195 44196 5daa40 WSARecv 44190->44196 44197 5d8f40 WSARecv 44190->44197 44220 5e7320 44190->44220 44226 5e0540 44190->44226 44272 5e7500 WSARecv 44190->44272 44273 5ac940 WSARecv 44190->44273 44191->44190 44192->44190 44193->44190 44194->44190 44195->44190 44196->44190 44197->44190 44199 5e2986 44198->44199 44199->44198 44200 5d8f40 WSARecv 44199->44200 44201 5e29b9 44199->44201 44200->44199 44202 5e08a0 WSARecv 44201->44202 44203 5e29be 44202->44203 44203->44172 44204->44172 44205->44172 44210 5e08aa 44206->44210 44207 5e08d5 44207->44172 44210->44206 44210->44207 44211 5e0968 44210->44211 44212 5e0928 44210->44212 44529 5ac560 WSARecv 44210->44529 44530 5e9320 WSARecv 44210->44530 44533 5d8f40 WSARecv 44210->44533 44532 5ac7c0 WSARecv 44211->44532 44531 5ac7c0 WSARecv 44212->44531 44216 5e097b 44217 5e0260 WSARecv 44216->44217 44219 5e098c 44217->44219 44218 5e0936 44218->44172 44219->44172 44221 5e732a 44220->44221 44221->44220 44222 5e7365 44221->44222 44275 5fa7e0 WSARecv 44221->44275 44276 5e73c0 WSARecv 44222->44276 44225 5e73a5 44225->44190 44229 5e054a 44226->44229 44227 5e086d 44277 5e0260 44227->44277 44229->44226 44229->44227 44234 5e0596 44229->44234 44230 5e0876 44230->44190 44231 5e0682 44232 5e06d6 44231->44232 44235 5e06b5 44231->44235 44298 5ac560 WSARecv 44232->44298 44233 5e0614 44233->44231 44240 5e0673 44233->44240 44234->44233 44241 5e0605 44234->44241 44237 5e0260 WSARecv 44235->44237 44242 5e06d0 44237->44242 44238 5e06e5 44239 5e06ef 44238->44239 44251 5e072f 44238->44251 44243 5e071b 44239->44243 44299 5ac8c0 WSARecv 44239->44299 44244 5e0260 WSARecv 44240->44244 44245 5e0260 WSARecv 44241->44245 44242->44190 44300 5ac7c0 WSARecv 44243->44300 44248 5e067c 44244->44248 44249 5e060e 44245->44249 44248->44190 44249->44190 44250 5e0729 44250->44190 44252 5e0791 44251->44252 44301 5ac8c0 WSARecv 44251->44301 44253 5e084b 44252->44253 44254 5e07a6 44252->44254 44306 5ac7c0 WSARecv 44253->44306 44255 5e07eb 44254->44255 44257 5e07c5 44254->44257 44303 5e8fe0 WSARecv 44255->44303 44302 5ac7c0 WSARecv 44257->44302 44258 5e0859 44260 5e0260 WSARecv 44258->44260 44264 5e0867 44260->44264 44263 5e07d3 44266 5e0260 WSARecv 44263->44266 44264->44190 44265 5e0825 44304 5ac7c0 WSARecv 44265->44304 44269 5e07e5 44266->44269 44268 5e0833 44270 5e0845 44268->44270 44305 5e2920 WSARecv 44268->44305 44269->44190 44270->44190 44272->44190 44273->44190 44274->44189 44275->44222 44276->44225 44281 5e026a 44277->44281 44280 5e036c 44323 5dca80 WSARecv 44280->44323 44281->44277 44281->44280 44285 5e0404 44281->44285 44287 5e0365 44281->44287 44289 5d8f40 WSARecv 44281->44289 44320 5ac560 WSARecv 44281->44320 44321 5e9180 WSARecv 44281->44321 44322 5ac7c0 WSARecv 44281->44322 44284 5e0371 44324 5ac7c0 WSARecv 44284->44324 44290 5e041b 44285->44290 44326 5ac7c0 WSARecv 44285->44326 44327 5ac8c0 WSARecv 44287->44327 44289->44281 44290->44230 44291 5e0391 44307 5dfcc0 44291->44307 44294 5e03b8 44296 5e03d2 44294->44296 44325 5ac560 WSARecv 44294->44325 44295 5e0469 44295->44230 44296->44230 44298->44238 44299->44243 44300->44250 44301->44252 44302->44263 44303->44265 44304->44268 44305->44270 44306->44258 44313 5dfcca 44307->44313 44309 5dfdc7 44351 5dfe40 44309->44351 44311 5dfdcc 44311->44294 44313->44307 44313->44309 44314 5dfd52 44313->44314 44328 5df1e0 44313->44328 44368 5ac560 WSARecv 44313->44368 44371 5d8f40 WSARecv 44313->44371 44316 5dfd89 44314->44316 44369 5ac8c0 WSARecv 44314->44369 44370 5ac7c0 WSARecv 44316->44370 44319 5dfd97 44319->44294 44320->44281 44321->44281 44322->44281 44323->44284 44324->44291 44325->44296 44326->44290 44327->44295 44329 5df1ea 44328->44329 44329->44328 44376 5eb560 WSARecv 44329->44376 44331 5df20d 44332 5df23a 44331->44332 44377 5e70c0 WSARecv 44331->44377 44334 5df265 44332->44334 44378 5ac560 WSARecv 44332->44378 44372 5ae7c0 44334->44372 44337 5df452 44390 5ac7c0 WSARecv 44337->44390 44338 5df271 44379 5dcae0 WSARecv 44338->44379 44340 5df2a5 44380 5e5080 WSARecv 44340->44380 44344 5df252 44344->44337 44382 5fbcc0 WSARecv 44344->44382 44383 608940 44344->44383 44346 5df2af 44347 5df315 44346->44347 44348 5e7320 WSARecv 44346->44348 44381 5eb680 WSARecv 44347->44381 44348->44347 44350 5df356 44350->44313 44353 5dfe4a 44351->44353 44352 5dfee3 44505 5eb560 WSARecv 44352->44505 44353->44351 44353->44352 44355 5dfe7c 44353->44355 44507 5d8f40 WSARecv 44353->44507 44495 5eb560 WSARecv 44355->44495 44356 5dfef4 44481 5d5c00 44356->44481 44360 5dfea5 44496 60a540 44360->44496 44364 5dfebf 44504 5eb680 WSARecv 44364->44504 44365 5dff0a 44365->44311 44367 5dfedd 44367->44311 44368->44313 44369->44316 44370->44319 44371->44313 44373 5ae7c6 44372->44373 44373->44372 44391 5adda0 44373->44391 44375 5ae7e5 44375->44338 44376->44331 44377->44332 44378->44344 44379->44340 44380->44346 44381->44350 44382->44344 44384 608961 44383->44384 44386 6089bf 44383->44386 44384->44386 44426 602a40 44384->44426 44430 5e5220 44384->44430 44438 5c9700 44384->44438 44385 608989 44385->44344 44386->44344 44390->44334 44404 5addaa 44391->44404 44393 5addeb 44413 5aea80 44393->44413 44395 5d8f40 WSARecv 44395->44404 44398 5adf76 44398->44375 44399 5adba0 WSARecv 44399->44404 44402 5ae518 44405 5ae546 44402->44405 44423 5d17c0 WSARecv 44402->44423 44404->44391 44404->44393 44404->44395 44404->44398 44404->44399 44404->44402 44406 5ae509 44404->44406 44417 5ae6a0 WSARecv 44404->44417 44418 5b6a20 WSARecv 44404->44418 44419 5b6460 WSARecv 44404->44419 44420 5c1b60 WSARecv 44404->44420 44421 5ae8a0 WSARecv 44404->44421 44407 5ae5b4 44405->44407 44424 5bacc0 WSARecv 44405->44424 44422 5ae720 WSARecv 44406->44422 44407->44375 44411 5ae5a5 44411->44407 44425 5badc0 WSARecv 44411->44425 44414 5aea86 44413->44414 44414->44413 44415 608940 WSARecv 44414->44415 44416 5ade39 44415->44416 44416->44375 44417->44404 44418->44404 44419->44404 44420->44404 44421->44404 44422->44402 44423->44405 44424->44411 44425->44407 44428 602a46 44426->44428 44427 5dfcc0 WSARecv 44429 602a65 44427->44429 44428->44426 44428->44427 44429->44385 44431 5e5226 44430->44431 44431->44430 44444 5e5280 WSARecv 44431->44444 44433 5e523f 44445 5e9380 WSARecv 44433->44445 44435 5e525a 44436 5e5268 44435->44436 44437 5e08a0 WSARecv 44435->44437 44436->44385 44437->44436 44439 5c9706 44438->44439 44439->44438 44442 5c9746 44439->44442 44480 5c8ea0 WSARecv 44439->44480 44446 5c9b20 44442->44446 44443 5c975c 44443->44385 44444->44433 44445->44435 44456 5c9b2f 44446->44456 44447 5ac560 WSARecv 44447->44456 44448 5c9c7d 44451 5c9d3e 44448->44451 44453 5c9a20 WSARecv 44448->44453 44449 5ceea0 WSARecv 44449->44456 44450 5cd800 WSARecv 44450->44456 44454 5ac7c0 WSARecv 44451->44454 44452 5ac7c0 WSARecv 44452->44456 44453->44451 44466 5c9c30 44454->44466 44455 5ca3c0 WSARecv 44455->44456 44456->44446 44456->44447 44456->44448 44456->44449 44456->44450 44456->44452 44456->44455 44457 5c9cd4 44456->44457 44460 5d8f40 WSARecv 44456->44460 44456->44466 44458 5ac7c0 WSARecv 44457->44458 44459 5c9ce5 44458->44459 44459->44443 44460->44456 44461 5ca0e0 WSARecv 44462 5c9f65 44461->44462 44463 5c9fb8 44462->44463 44465 5b7b60 WSARecv 44462->44465 44464 5d2c00 WSARecv 44463->44464 44468 5c9fd4 44464->44468 44469 5c9fa7 44465->44469 44467 5c40a0 WSARecv 44466->44467 44475 5c9f16 44466->44475 44470 5c9ec7 44467->44470 44471 5c9ff5 44468->44471 44473 5d2c00 WSARecv 44468->44473 44472 5d2c00 WSARecv 44469->44472 44470->44475 44476 5be200 WSARecv 44470->44476 44474 5d2cc0 WSARecv 44471->44474 44472->44463 44473->44471 44477 5ca005 44474->44477 44475->44461 44476->44475 44478 5d2da0 WSARecv 44477->44478 44479 5ca074 44478->44479 44479->44443 44480->44442 44508 5d6680 44481->44508 44484 5d5c51 44511 5d6400 44484->44511 44486 5ac560 WSARecv 44492 5d5c7e 44486->44492 44490 5db260 WSARecv 44490->44492 44492->44486 44492->44490 44514 5da9e0 WSARecv 44492->44514 44515 5db080 WSARecv 44492->44515 44516 5dafa0 WSARecv 44492->44516 44517 5daa40 WSARecv 44492->44517 44518 5d8f40 WSARecv 44492->44518 44495->44360 44497 60a565 44496->44497 44498 60a5c7 44496->44498 44497->44498 44500 60a57a 44497->44500 44499 60a520 WSARecv 44498->44499 44501 60a5e1 44499->44501 44523 60a520 44500->44523 44501->44364 44504->44367 44505->44356 44506 5eb680 WSARecv 44506->44365 44507->44353 44519 5d6320 44508->44519 44512 5d6320 WSARecv 44511->44512 44513 5d5c66 44512->44513 44513->44506 44514->44492 44515->44492 44516->44492 44517->44492 44518->44492 44520 5d633c 44519->44520 44521 60a540 WSARecv 44520->44521 44522 5d5c35 44521->44522 44522->44484 44522->44492 44526 60c0e0 44523->44526 44524 60a52d 44524->44364 44528 60c100 WSARecv 44526->44528 44528->44524 44529->44210 44530->44210 44531->44218 44532->44216 44533->44210 44534 6086a0 44535 6086c0 44534->44535 44538 60f540 44535->44538 44537 608809 44541 5e51a0 44538->44541 44543 5e51a6 44541->44543 44542 608940 WSARecv 44544 5e51eb 44542->44544 44543->44541 44543->44542 44544->44537 44545 5aeb40 44546 5aeb46 44545->44546 44546->44545 44549 5aeb80 44546->44549 44548 5aeb68 44550 5aeb8a 44549->44550 44550->44549 44551 5aebc5 44550->44551 44555 5d8f40 WSARecv 44550->44555 44552 5aec9b 44551->44552 44554 5aebd6 44551->44554 44553 5b78a0 WSARecv 44552->44553 44556 5aeca5 44553->44556 44557 5aec0a 44554->44557 44576 5ac560 WSARecv 44554->44576 44555->44550 44556->44548 44562 5aec96 44557->44562 44571 5b78a0 44557->44571 44561 5aedb0 44597 5d8f40 WSARecv 44561->44597 44598 5ac7c0 WSARecv 44561->44598 44563 5aed09 44562->44563 44577 5ac7c0 WSARecv 44562->44577 44564 5aed45 44563->44564 44578 5d2c00 44563->44578 44564->44548 44570 5d2c00 WSARecv 44570->44564 44572 5d2c00 WSARecv 44571->44572 44573 5b78bb 44572->44573 44599 5d6580 44573->44599 44576->44557 44577->44563 44579 5d2c25 44578->44579 44580 5aed30 44579->44580 44602 5da9e0 WSARecv 44579->44602 44580->44570 44582 5d2c45 44603 5db260 WSARecv 44582->44603 44584 5d2c56 44604 5dafa0 WSARecv 44584->44604 44586 5d2c65 44605 5db260 WSARecv 44586->44605 44588 5d2c76 44606 5db080 WSARecv 44588->44606 44590 5d2c85 44607 5dac20 WSARecv 44590->44607 44592 5d2c8a 44608 5daa40 WSARecv 44592->44608 44594 5d2c8f 44609 5d8f40 WSARecv 44594->44609 44596 5d2ca5 44597->44561 44598->44561 44600 5d6320 WSARecv 44599->44600 44601 5aec85 44600->44601 44601->44561 44601->44562 44602->44582 44603->44584 44604->44586 44605->44588 44606->44590 44607->44592 44608->44594 44609->44596 44610 5d4e60 44611 5d4e6a 44610->44611 44611->44610 44632 5d44a0 44611->44632 44621 5d4eb6 44662 5d4400 44621->44662 44625 5d4eca 44684 5d4940 44625->44684 44627 5d4ecf 44628 5d6400 WSARecv 44627->44628 44629 5d4f05 44628->44629 44691 5d6480 44629->44691 44636 5d44aa 44632->44636 44633 5d8f40 WSARecv 44633->44636 44634 5d4340 WSARecv 44634->44636 44635 5d6500 WSARecv 44635->44636 44636->44632 44636->44633 44636->44634 44636->44635 44637 5d4770 44636->44637 44638 5edf00 44637->44638 44639 5edf0a 44638->44639 44639->44638 44640 5d6320 WSARecv 44639->44640 44641 5edf2a 44640->44641 44642 5d6400 WSARecv 44641->44642 44643 5edf45 44642->44643 44644 5d6480 WSARecv 44643->44644 44645 5edf85 44644->44645 44646 5d6400 WSARecv 44645->44646 44647 5d4ea5 44646->44647 44648 5ee060 44647->44648 44651 5ee06a 44648->44651 44649 5d6480 WSARecv 44650 5ee097 44649->44650 44652 5d6480 WSARecv 44650->44652 44651->44648 44651->44649 44653 5ee0ce 44652->44653 44654 5d6480 WSARecv 44653->44654 44655 5d4eaa 44654->44655 44656 5d4b00 44655->44656 44657 5d4b0a 44656->44657 44657->44656 44658 5d6580 WSARecv 44657->44658 44659 5d4b3b 44658->44659 44660 5d4b73 44659->44660 44661 5d6400 WSARecv 44659->44661 44694 5d4a40 WSARecv 44660->44694 44661->44660 44663 5d440a 44662->44663 44663->44662 44664 5d6480 WSARecv 44663->44664 44665 5d445b 44663->44665 44695 5d8f40 WSARecv 44663->44695 44664->44663 44667 5d4ba0 44665->44667 44672 5d4baa 44667->44672 44669 5d4cce 44669->44625 44670 5d6320 WSARecv 44670->44672 44672->44667 44672->44669 44672->44670 44674 5d4d79 44672->44674 44699 5d6500 44672->44699 44702 5d4f80 WSARecv 44672->44702 44703 5ea1e0 WSARecv 44672->44703 44696 5d6700 44674->44696 44676 5d4e10 44676->44625 44677 5d4db3 44677->44676 44704 5da9e0 WSARecv 44677->44704 44679 5d4df3 44705 5db260 WSARecv 44679->44705 44681 5d4e05 44706 5daa40 WSARecv 44681->44706 44683 5d4e0a 44683->44625 44685 5d494a 44684->44685 44685->44684 44686 5d6500 WSARecv 44685->44686 44689 5d4991 44686->44689 44687 5d6400 WSARecv 44688 5d49dd 44687->44688 44688->44627 44689->44687 44690 5d4a2b 44689->44690 44690->44627 44692 5d6320 WSARecv 44691->44692 44693 5d4f45 44692->44693 44694->44621 44695->44663 44697 5d6320 WSARecv 44696->44697 44698 5d6756 44697->44698 44698->44677 44700 5d6320 WSARecv 44699->44700 44701 5d6556 44700->44701 44701->44672 44702->44672 44703->44672 44704->44679 44705->44681 44706->44683 44707 5dc720 44721 5dc72a 44707->44721 44721->44707 44727 5dc929 44721->44727 44731 5ace80 44721->44731 44746 5a1a40 44721->44746 44752 5d5000 44721->44752 44767 5eadc0 44721->44767 44783 5ea540 WSARecv 44721->44783 44784 5f4960 WSARecv 44721->44784 44785 5ea040 WSARecv 44721->44785 44786 5a5140 WSARecv 44721->44786 44787 5dcae0 WSARecv 44721->44787 44788 5f4740 WSARecv 44721->44788 44789 601040 WSARecv 44721->44789 44790 5ab3e0 WSARecv 44721->44790 44791 5f2ae0 WSARecv 44721->44791 44792 5ba9e0 WSARecv 44721->44792 44793 5eff80 44721->44793 44802 5ac560 WSARecv 44721->44802 44803 5a8620 WSARecv 44721->44803 44804 5e6720 WSARecv 44721->44804 44806 5d8f40 WSARecv 44721->44806 44805 5ac7c0 WSARecv 44727->44805 44730 5dc937 44742 5ace8a 44731->44742 44732 5d8f40 WSARecv 44732->44742 44733 5da9e0 WSARecv 44733->44742 44734 5dafa0 WSARecv 44734->44742 44735 5acf4b 44807 5c8d20 44735->44807 44737 5db080 WSARecv 44737->44742 44740 5db260 WSARecv 44740->44742 44741 5daa40 WSARecv 44741->44742 44742->44731 44742->44732 44742->44733 44742->44734 44742->44735 44742->44737 44742->44740 44742->44741 44743 5acfe2 44743->44721 44744 5acf5c 44744->44743 44826 5ba8a0 44744->44826 44748 5a1a46 44746->44748 44748->44746 44898 5a1fe0 44748->44898 44749 5a1a5d 44908 5a1aa0 WSARecv 44749->44908 44751 5a1a6c 44751->44721 44755 5d500a 44752->44755 44753 5d6320 WSARecv 44753->44755 44755->44752 44755->44753 44756 5d515c 44755->44756 44766 5d520b 44755->44766 44924 5ef080 WSARecv 44755->44924 44925 5f3be0 WSARecv 44755->44925 44757 5d6400 WSARecv 44756->44757 44759 5d5171 44757->44759 44926 606ae0 WSARecv 44759->44926 44761 5d51af 44762 5d6480 WSARecv 44761->44762 44763 5d51cd 44762->44763 44912 5d4800 44763->44912 44765 5d51e5 44765->44721 44766->44721 44768 5eadca 44767->44768 44768->44767 44929 5a8620 WSARecv 44768->44929 44770 5eae0b 44771 5ae7c0 WSARecv 44770->44771 44772 5eae25 44771->44772 44930 604980 WSARecv 44772->44930 44774 5eae65 44931 5eb0c0 WSARecv 44774->44931 44776 5eaebe 44932 5eb0c0 WSARecv 44776->44932 44778 5eaecf 44933 5a8620 WSARecv 44778->44933 44780 5eaefb 44934 6062e0 WSARecv 44780->44934 44782 5eaf05 44782->44721 44783->44721 44784->44721 44785->44721 44786->44721 44787->44721 44788->44721 44789->44721 44790->44721 44791->44721 44792->44721 44801 5eff8a 44793->44801 44794 5d8f40 WSARecv 44794->44801 44795 5b78a0 WSARecv 44795->44801 44796 5ac560 WSARecv 44796->44801 44798 5ac7c0 WSARecv 44798->44801 44799 5f0011 44799->44721 44801->44793 44801->44794 44801->44795 44801->44796 44801->44798 44801->44799 44935 5c9780 44801->44935 44941 5cab00 WSARecv 44801->44941 44802->44721 44803->44721 44804->44721 44805->44730 44806->44721 44808 5c8d2a 44807->44808 44808->44807 44853 5ba780 WSARecv 44808->44853 44810 5c8d5e 44854 5ba780 WSARecv 44810->44854 44812 5c8d85 44855 5ba780 WSARecv 44812->44855 44814 5c8da9 44856 5ba780 WSARecv 44814->44856 44816 5c8dcd 44857 5ba780 WSARecv 44816->44857 44818 5c8df1 44858 5ba780 WSARecv 44818->44858 44820 5c8e15 44859 5ba780 WSARecv 44820->44859 44822 5c8e39 44838 5cbb00 44822->44838 44825 5b6680 WSARecv 44825->44744 44830 5ba8aa 44826->44830 44827 5ba8be 44829 5ba8c7 44827->44829 44831 5ba917 44827->44831 44833 5aea80 WSARecv 44827->44833 44829->44744 44830->44826 44830->44827 44892 5da9e0 WSARecv 44830->44892 44893 5db260 WSARecv 44830->44893 44894 5daa40 WSARecv 44830->44894 44895 5d8f40 WSARecv 44830->44895 44834 5ba947 44831->44834 44886 5c8ac0 44831->44886 44833->44831 44834->44744 44851 5cbb0a 44838->44851 44839 5cbb2a 44860 5d1de0 44839->44860 44840 5da9e0 WSARecv 44840->44851 44842 5db260 WSARecv 44842->44851 44843 5cbb76 44864 5cdfe0 44843->44864 44846 5cbb85 44869 5c4d20 44846->44869 44848 5db080 WSARecv 44848->44851 44849 5dac20 WSARecv 44849->44851 44850 5daa40 WSARecv 44850->44851 44851->44838 44851->44839 44851->44840 44851->44842 44851->44848 44851->44849 44851->44850 44873 5d8f40 WSARecv 44851->44873 44853->44810 44854->44812 44855->44814 44856->44816 44857->44818 44858->44820 44859->44822 44861 5d1de6 44860->44861 44861->44860 44862 5aea80 WSARecv 44861->44862 44863 5d1e1a 44862->44863 44863->44843 44867 5cdfea 44864->44867 44865 5ce0e5 44865->44846 44867->44864 44867->44865 44874 5b7ea0 44867->44874 44881 5d8f40 WSARecv 44867->44881 44870 5c4d2a 44869->44870 44870->44869 44882 5ce9c0 44870->44882 44872 5acf57 44872->44825 44873->44851 44877 5b7eaa 44874->44877 44875 5d6580 WSARecv 44876 5b7ee5 44875->44876 44878 5b7f05 44876->44878 44879 5d6580 WSARecv 44876->44879 44877->44874 44877->44875 44878->44867 44880 5b7f45 44879->44880 44880->44867 44881->44867 44883 5ce9c6 44882->44883 44883->44882 44884 5b7ea0 WSARecv 44883->44884 44885 5ce9e5 44884->44885 44885->44872 44890 5c8aca 44886->44890 44887 5b78a0 WSARecv 44887->44890 44888 5c8c1c 44888->44834 44890->44886 44890->44887 44890->44888 44896 5b7940 WSARecv 44890->44896 44897 5d8f40 WSARecv 44890->44897 44892->44830 44893->44830 44894->44830 44895->44830 44896->44890 44897->44890 44900 5a1fea 44898->44900 44899 5ae7c0 WSARecv 44901 5a1ffe 44899->44901 44900->44898 44900->44899 44905 5a215b 44901->44905 44909 5ef160 WSARecv 44901->44909 44906 5a236d 44905->44906 44910 5ef160 WSARecv 44905->44910 44907 5a257a 44906->44907 44911 5ef160 WSARecv 44906->44911 44907->44749 44908->44751 44909->44905 44910->44906 44911->44907 44913 5d480a 44912->44913 44913->44912 44914 5d6500 WSARecv 44913->44914 44915 5d4845 44914->44915 44916 5d491a 44915->44916 44927 5d4340 WSARecv 44915->44927 44916->44765 44918 5d487d 44919 5d4914 44918->44919 44928 606ae0 WSARecv 44918->44928 44919->44765 44921 5d48ba 44922 5d6500 WSARecv 44921->44922 44923 5d48fc 44922->44923 44923->44765 44924->44755 44925->44755 44926->44761 44927->44918 44928->44921 44929->44770 44930->44774 44931->44776 44932->44778 44933->44780 44934->44782 44936 5c9786 44935->44936 44936->44935 44937 5c9792 44936->44937 44942 5d8f40 WSARecv 44936->44942 44939 5c9b20 WSARecv 44937->44939 44940 5c9799 44939->44940 44940->44801 44941->44801 44942->44936 44943 5de8e0 44944 5de8f3 44943->44944 44949 5de960 44944->44949 44948 5de954 44950 5de96a 44949->44950 44950->44949 44951 5de989 44950->44951 44999 5d8f40 WSARecv 44950->44999 44964 5d5da0 44951->44964 44954 5de9c5 44955 5de9dc 44954->44955 44997 5dea60 WSARecv 44954->44997 44957 5de9fd 44955->44957 44980 5e79a0 44955->44980 44960 5dea1e 44957->44960 44998 5e70c0 WSARecv 44957->44998 44959 5e2d40 WSARecv 44961 5de94a 44959->44961 44960->44959 44963 5deaa0 WSARecv 44961->44963 44963->44948 44979 5d5daf 44964->44979 44965 5d6700 WSARecv 44965->44979 44967 5d6320 WSARecv 44967->44979 44969 5d6580 WSARecv 44969->44979 44970 5d6500 WSARecv 44970->44979 44971 5dac20 WSARecv 44971->44979 44972 5daa40 WSARecv 44972->44979 44973 5d5f8c 44973->44954 44974 5da9e0 WSARecv 44974->44979 44975 5db260 WSARecv 44975->44979 44976 5dafa0 WSARecv 44976->44979 44977 5db0e0 WSARecv 44977->44979 44978 5d8f40 WSARecv 44978->44979 44979->44964 44979->44965 44979->44967 44979->44969 44979->44970 44979->44971 44979->44972 44979->44973 44979->44974 44979->44975 44979->44976 44979->44977 44979->44978 45000 5ac560 WSARecv 44979->45000 45001 5ac7c0 WSARecv 44979->45001 44995 5e79aa 44980->44995 44982 608940 WSARecv 44982->44995 44984 60a540 WSARecv 44984->44995 44987 5ac7c0 WSARecv 44987->44995 44991 5e2a00 WSARecv 44991->44995 44992 5d4a40 WSARecv 44992->44995 44993 5ac560 WSARecv 44993->44995 44994 5e7500 WSARecv 44994->44995 44995->44980 44995->44982 44995->44984 44995->44987 44995->44991 44995->44992 44995->44993 44995->44994 45002 5e7f40 44995->45002 45015 5e7560 WSARecv 44995->45015 45016 5f8ea0 WSARecv 44995->45016 45017 5acd00 WSARecv 44995->45017 45018 5d3ee0 WSARecv 44995->45018 45019 5c3ae0 WSARecv 44995->45019 45020 5bacc0 WSARecv 44995->45020 45021 5e8340 WSARecv 44995->45021 44997->44955 44998->44960 44999->44950 45000->44979 45001->44979 45003 5e7f4a 45002->45003 45003->45002 45026 5ac560 WSARecv 45003->45026 45005 5e8047 45027 5ac7c0 WSARecv 45005->45027 45007 5e8055 45007->44995 45010 5e7500 WSARecv 45013 5e7f65 45010->45013 45012 5e0540 WSARecv 45012->45013 45013->45005 45013->45010 45013->45012 45022 5e82a0 45013->45022 45028 5ac7c0 WSARecv 45013->45028 45029 5fb880 WSARecv 45013->45029 45030 5ac560 WSARecv 45013->45030 45015->44995 45016->44995 45017->44995 45018->44995 45019->44995 45020->44995 45021->44995 45023 5e82a6 45022->45023 45023->45022 45024 5e82f5 45023->45024 45031 5d6a20 45023->45031 45024->45013 45026->45013 45027->45007 45028->45013 45029->45013 45030->45013 45032 5d6a32 45031->45032 45032->45031 45033 5d6e45 45032->45033 45035 5d6a97 45032->45035 45037 5d6700 WSARecv 45032->45037 45039 5d6b46 45032->45039 45060 5d8f40 WSARecv 45032->45060 45070 5ac560 WSARecv 45032->45070 45077 5da9e0 WSARecv 45032->45077 45078 5db260 WSARecv 45032->45078 45079 5dafa0 WSARecv 45032->45079 45080 5dac20 WSARecv 45032->45080 45081 5daa40 WSARecv 45032->45081 45033->45024 45071 5ac7c0 WSARecv 45035->45071 45037->45032 45038 5d6aa6 45038->45024 45072 5ac7c0 WSARecv 45039->45072 45041 5d6b55 45073 5ac560 WSARecv 45041->45073 45044 5d6b90 45046 5d6400 WSARecv 45044->45046 45047 5d6bad 45046->45047 45048 5d6bcd 45047->45048 45049 5d6de1 45047->45049 45051 5d6480 WSARecv 45048->45051 45076 5ac7c0 WSARecv 45049->45076 45053 5d6bf7 45051->45053 45074 5ac7c0 WSARecv 45053->45074 45055 5d6def 45057 5d6400 WSARecv 45055->45057 45059 5d6e0c 45057->45059 45059->45024 45060->45032 45061 5d6c17 45062 5d6d45 45061->45062 45075 5da520 WSARecv 45061->45075 45063 5d6400 WSARecv 45062->45063 45065 5d6d92 45063->45065 45067 5d6400 WSARecv 45065->45067 45066 5d6ced 45066->45062 45069 5d6480 WSARecv 45066->45069 45068 5d6dc5 45067->45068 45068->45024 45069->45062 45070->45032 45071->45038 45072->45041 45073->45044 45074->45061 45075->45066 45076->45055 45077->45032 45078->45032 45079->45032 45080->45032 45081->45032 45082 5e7e60 45083 5e7e6a 45082->45083 45083->45082 45084 5e7ec7 45083->45084 45085 5d6680 WSARecv 45083->45085 45086 5d6480 WSARecv 45084->45086 45085->45084 45087 5e7f1a 45086->45087 45088 5f10a0 45093 5f10b2 45088->45093 45089 5da9e0 WSARecv 45089->45093 45091 5f1471 45102 5f14af 45091->45102 45153 5f5fe0 WSARecv 45091->45153 45092 5f1426 45095 5f143b 45092->45095 45150 5f1d60 WSARecv 45092->45150 45093->45088 45093->45089 45093->45091 45093->45092 45094 5db0e0 WSARecv 45093->45094 45123 5dac20 WSARecv 45093->45123 45124 5daa40 WSARecv 45093->45124 45126 5fe240 WSARecv 45093->45126 45130 5db260 WSARecv 45093->45130 45131 5db1e0 WSARecv 45093->45131 45132 5d8f40 WSARecv 45093->45132 45163 5dafa0 WSARecv 45093->45163 45164 5f51a0 WSARecv 45093->45164 45094->45093 45096 5f145e 45095->45096 45151 5e3800 WSARecv 45095->45151 45152 5e3400 WSARecv 45096->45152 45098 5f1582 45128 5f15ca 45098->45128 45156 5da9e0 WSARecv 45098->45156 45102->45098 45103 5f150d 45102->45103 45154 5dd8c0 WSARecv 45103->45154 45106 5f1529 45133 5f0c60 45106->45133 45107 5f1594 45157 5db260 WSARecv 45107->45157 45112 5f15a5 45158 5dafa0 WSARecv 45112->45158 45116 5f1552 45117 5f15b1 45159 5db260 WSARecv 45117->45159 45119 5f15c5 45160 5daa40 WSARecv 45119->45160 45120 5daa40 WSARecv 45120->45128 45122 5da9e0 WSARecv 45122->45128 45123->45093 45124->45093 45125 5db0e0 WSARecv 45125->45128 45126->45093 45127 5db260 WSARecv 45127->45128 45128->45120 45128->45122 45128->45125 45128->45127 45161 5d8f40 WSARecv 45128->45161 45162 5dafa0 WSARecv 45128->45162 45130->45093 45131->45093 45132->45093 45134 5f0c6f 45133->45134 45134->45133 45135 5f0c92 45134->45135 45136 5d8f40 WSARecv 45134->45136 45137 5eff80 WSARecv 45135->45137 45136->45134 45138 5f0d45 45137->45138 45140 5f0dba 45138->45140 45142 5f0ded 45138->45142 45169 5d8f40 WSARecv 45138->45169 45170 5f0b00 WSARecv 45140->45170 45165 5fc800 WSARecv 45142->45165 45145 5f0f36 45149 5f0f5c 45145->45149 45166 5f0760 WSARecv 45145->45166 45167 5fce40 WSARecv 45145->45167 45148 5f0f91 45155 5dd8c0 WSARecv 45148->45155 45168 5f0260 WSARecv 45149->45168 45150->45095 45151->45096 45152->45091 45153->45102 45154->45106 45155->45116 45156->45107 45157->45112 45158->45117 45159->45119 45160->45128 45161->45128 45162->45128 45163->45093 45164->45093 45165->45145 45166->45145 45167->45145 45168->45148 45169->45140 45170->45142

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 450 5ad200-5ad209 451 5ad20f-5ad252 450->451 452 5ad986-5ad9b3 call 608a60 450->452 453 5ad25b-5ad279 call 5aee40 451->453 454 5ad254-5ad256 451->454 452->450 464 5ad27b-5ad2a0 453->464 465 5ad2a5 453->465 456 5ad627-5ad62d 454->456 459 5ad752-5ad761 456->459 460 5ad633-5ad654 456->460 466 5ad764-5ad767 459->466 462 5ad656-5ad663 460->462 463 5ad665-5ad687 460->463 469 5ad6e1-5ad6e7 462->469 470 5ad689-5ad68c 463->470 471 5ad68e-5ad6a0 call 5b7ea0 463->471 464->456 472 5ad2aa-5ad323 465->472 467 5ad82b-5ad835 466->467 468 5ad76d-5ad783 call 5ad9c0 466->468 475 5ad850-5ad869 467->475 476 5ad837-5ad84e 467->476 491 5ad789-5ad821 call 5ba8a0 * 2 468->491 492 5ad8c5-5ad8d1 468->492 477 5ad6e9-5ad6ec 469->477 478 5ad73e-5ad750 469->478 470->469 481 5ad6a5-5ad6d9 471->481 487 5ad329-5ad334 472->487 488 5ad585-5ad590 472->488 485 5ad87a-5ad8a6 475->485 486 5ad86b-5ad878 475->486 482 5ad8aa-5ad8ad 476->482 483 5ad6f2-5ad739 call 5b7dc0 477->483 484 5ad5f6-5ad624 477->484 478->466 481->469 494 5ad8af-5ad8b6 482->494 495 5ad8e5-5ad985 call 5da9e0 call 5db260 call 5db0e0 call 5db260 call 5db0e0 call 5db260 * 2 call 5dac20 call 5daa40 call 5d8f40 482->495 483->484 484->456 485->482 486->482 489 5ad33a-5ad34a 487->489 490 5ad5e9-5ad5f1 call 60ad60 487->490 496 5ad350-5ad385 call 5d6580 489->496 497 5ad3f7-5ad408 489->497 490->484 491->467 502 5ad8b8-5ad8c0 494->502 503 5ad8d2-5ad8e0 call 5d8f40 494->503 495->452 510 5ad38a-5ad3a4 496->510 508 5ad40e-5ad43b call 5aee40 497->508 509 5ad5c7-5ad5d3 call 5d8f40 497->509 502->472 503->495 524 5ad45c-5ad467 508->524 525 5ad43d-5ad456 call 5aea80 508->525 516 5ad5d8-5ad5e4 call 5d8f40 509->516 515 5ad3aa-5ad3b9 510->515 510->516 520 5ad3bb-5ad3bc 515->520 521 5ad3be 515->521 516->490 528 5ad3bf-5ad3ed 520->528 521->528 526 5ad56e-5ad57b 524->526 527 5ad46d-5ad487 524->527 525->524 540 5ad5b6-5ad5c2 call 5d8f40 525->540 526->488 531 5ad48d-5ad499 527->531 532 5ad536-5ad54b 527->532 528->497 535 5ad49b 531->535 536 5ad4a2-5ad4c3 call 5aea80 531->536 538 5ad59c-5ad5a0 call 60adc0 532->538 539 5ad54d-5ad557 532->539 535->536 549 5ad5a5-5ad5b1 call 5d8f40 536->549 551 5ad4c9-5ad50e 536->551 538->549 545 5ad559-5ad569 539->545 546 5ad591-5ad597 call 60ad40 539->546 540->509 546->538 549->540 554 5ad510-5ad519 call 60b700 551->554 555 5ad521-5ad52e 551->555 554->555 555->532
                Strings
                • out of memory allocating allArenas/memory/classes/heap/objects:bytesruntime.SetFinalizer: cannot pass too many pages allocated in chunk?mspan.ensureSwept: m is not lockedVirtualQuery for stack base failedforEachP: sched.safePointWait != 0schedule: spinning wit, xrefs: 005AD5A5
                • ) not in usable address space: runtime: cannot allocate memorycheckmark found unmarked objectruntime: failed to commit pages/memory/classes/heap/free:bytes/memory/classes/os-stacks:bytespacer: sweep done at heap size non in-use span in unswept listcasgstatus: , xrefs: 005AD945
                • out of memory allocating heap arena map/cpu/classes/gc/mark/assist:cpu-seconds/cpu/classes/scavenge/total:cpu-seconds/memory/classes/profiling/buckets:bytesmspan.sweep: bad span state after sweepruntime: blocked write on free polldescPowerRegisterSuspendResume, xrefs: 005AD5D8
                • , xrefs: 005AD88F
                • base outside usable address spaceruntime: memory allocated by OS [misrounded allocation in sysAllocconcurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-c, xrefs: 005AD871
                • memory reservation exceeds address space limittried to park scavenger from another goroutinereleased less than one physical page of memory (bad use of unsafe.Pointer? try -d=checkptr)sysGrow bounds not aligned to pallocChunkBytesruntime: failed to create new , xrefs: 005AD972
                • arena already initialized to unused region of span bytes failed with errno=runtime: VirtualAlloc of /sched/gomaxprocs:threadsremaining pointer buffersslice bounds out of range_cgo_thread_start missingallgadd: bad status Gidleruntime: program exceeds startm: p , xrefs: 005AD5C7
                • out of memory allocating heap arena metadata/cpu/classes/scavenge/background:cpu-secondsruntime: unexpected metric registration for gcmarknewobject called while doing checkmarkactive sweepers found at start of mark phaseno P available, write barriers are forbi, xrefs: 005AD5B6
                • region exceeds uintptr range/gc/heap/frees-by-size:bytes/gc/heap/tiny/allocs:objects/sched/goroutines:goroutinesgcBgMarkWorker: mode not setmspan.sweep: m is not lockedfound pointer to free objectmheap.freeSpanLocked - span runtime.semasleep unexpectedfatal: m, xrefs: 005AD847
                • end outside usable address spaceGCProg for type that isn't largeruntime: failed to release pagesruntime: fixalloc size too largeinvalid limiter event type foundscanstack: goroutine not stoppedscavenger state is already wiredsweep increased allocation countremo, xrefs: 005AD89F
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: $) not in usable address space: runtime: cannot allocate memorycheckmark found unmarked objectruntime: failed to commit pages/memory/classes/heap/free:bytes/memory/classes/os-stacks:bytespacer: sweep done at heap size non in-use span in unswept listcasgstatus: $arena already initialized to unused region of span bytes failed with errno=runtime: VirtualAlloc of /sched/gomaxprocs:threadsremaining pointer buffersslice bounds out of range_cgo_thread_start missingallgadd: bad status Gidleruntime: program exceeds startm: p $base outside usable address spaceruntime: memory allocated by OS [misrounded allocation in sysAllocconcurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-c$end outside usable address spaceGCProg for type that isn't largeruntime: failed to release pagesruntime: fixalloc size too largeinvalid limiter event type foundscanstack: goroutine not stoppedscavenger state is already wiredsweep increased allocation countremo$memory reservation exceeds address space limittried to park scavenger from another goroutinereleased less than one physical page of memory (bad use of unsafe.Pointer? try -d=checkptr)sysGrow bounds not aligned to pallocChunkBytesruntime: failed to create new $out of memory allocating allArenas/memory/classes/heap/objects:bytesruntime.SetFinalizer: cannot pass too many pages allocated in chunk?mspan.ensureSwept: m is not lockedVirtualQuery for stack base failedforEachP: sched.safePointWait != 0schedule: spinning wit$out of memory allocating heap arena map/cpu/classes/gc/mark/assist:cpu-seconds/cpu/classes/scavenge/total:cpu-seconds/memory/classes/profiling/buckets:bytesmspan.sweep: bad span state after sweepruntime: blocked write on free polldescPowerRegisterSuspendResume$out of memory allocating heap arena metadata/cpu/classes/scavenge/background:cpu-secondsruntime: unexpected metric registration for gcmarknewobject called while doing checkmarkactive sweepers found at start of mark phaseno P available, write barriers are forbi$region exceeds uintptr range/gc/heap/frees-by-size:bytes/gc/heap/tiny/allocs:objects/sched/goroutines:goroutinesgcBgMarkWorker: mode not setmspan.sweep: m is not lockedfound pointer to free objectmheap.freeSpanLocked - span runtime.semasleep unexpectedfatal: m
                • API String ID: 0-847506971
                • Opcode ID: b881efb49170ed06758485bab7d313c702d3bbd842a17acfa894e5e2db098b8c
                • Instruction ID: b0a26574ad0b3243215a1f0aa12ae778eb4ccc17a53cef4dc2184874c2c4d509
                • Opcode Fuzzy Hash: b881efb49170ed06758485bab7d313c702d3bbd842a17acfa894e5e2db098b8c
                • Instruction Fuzzy Hash: 09028972609B8482EB649B55F4407AEBB65F78AB90F448226EFDE17B99CF3CC444C710
                Strings
                • mallocgc called without a P or outside bootstrappingruntime.SetFinalizer: pointer not in allocated blockruntime: use of FixAlloc_Alloc before FixAlloc_Initspan set block with unpopped elements found in resetruntime: GetQueuedCompletionStatusEx failed (errno= , xrefs: 005AE625
                • mallocgc called with gcphase == _GCmarkterminationrecursive call during initialization - linker skewattempt to execute system stack code on user stackcompileCallback: function argument frame too largelimiterEvent.stop: invalid limiter event type foundpotential, xrefs: 005AE658
                • malloc deadlockruntime error: with GC progscan missed a gmisaligned maskruntime: min = runtime: inUse=runtime: max = bad panic stackrecovery failedstopm holding pstartm: m has ppreempt SPWRITEmissing mcache?ms: gomaxprocs=randinit missed]morebuf={pc:: no , xrefs: 005AE647
                • delayed zeroing on data that may contain pointerssweeper left outstanding across sweep generationsfully empty unfreed span set block found in resetcasgstatus: waiting for Gwaiting but is Grunnablenot enough significant bits after mult128bitPow10the :: must exp, xrefs: 005AE5DD
                • !"#$%%&&''((()))*++,,,,,------....//////0001123333333333444444444455666677777888888888889999999999::::::;;;;;;;;;;;;;;;;<<<<<<<<<<<<<<<<=====>>>>>>>>>>>??????????@@@@@@@@@@@@@@@@@@@@@@AAAAAAAAAAAAAAAAAAAAABBBBBBBBBBBCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC, xrefs: 005AE133
                • malloc during signalclose of nil channelinconsistent lockedmnotetsleep not on g0bad system page size to unallocated span/gc/scan/stack:bytes/gc/scan/total:bytes/gc/heap/frees:bytes/gc/gomemlimit:bytesp mcache not flushed markroot jobs donepacer: assist ratio=, xrefs: 005AE636
                • unexpected malloc header in delayed zeroing of large objectsync/atomic: store of inconsistently typed value into Valuereflect: call of reflect.Value.Len on ptr to non-array Valuemanual span allocation called with non-manually-managed typeaddr range base and li, xrefs: 005AE5CC
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: !"#$%%&&''((()))*++,,,,,------....//////0001123333333333444444444455666677777888888888889999999999::::::;;;;;;;;;;;;;;;;<<<<<<<<<<<<<<<<=====>>>>>>>>>>>??????????@@@@@@@@@@@@@@@@@@@@@@AAAAAAAAAAAAAAAAAAAAABBBBBBBBBBBCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC$delayed zeroing on data that may contain pointerssweeper left outstanding across sweep generationsfully empty unfreed span set block found in resetcasgstatus: waiting for Gwaiting but is Grunnablenot enough significant bits after mult128bitPow10the :: must exp$malloc deadlockruntime error: with GC progscan missed a gmisaligned maskruntime: min = runtime: inUse=runtime: max = bad panic stackrecovery failedstopm holding pstartm: m has ppreempt SPWRITEmissing mcache?ms: gomaxprocs=randinit missed]morebuf={pc:: no $malloc during signalclose of nil channelinconsistent lockedmnotetsleep not on g0bad system page size to unallocated span/gc/scan/stack:bytes/gc/scan/total:bytes/gc/heap/frees:bytes/gc/gomemlimit:bytesp mcache not flushed markroot jobs donepacer: assist ratio=$mallocgc called with gcphase == _GCmarkterminationrecursive call during initialization - linker skewattempt to execute system stack code on user stackcompileCallback: function argument frame too largelimiterEvent.stop: invalid limiter event type foundpotential$mallocgc called without a P or outside bootstrappingruntime.SetFinalizer: pointer not in allocated blockruntime: use of FixAlloc_Alloc before FixAlloc_Initspan set block with unpopped elements found in resetruntime: GetQueuedCompletionStatusEx failed (errno= $unexpected malloc header in delayed zeroing of large objectsync/atomic: store of inconsistently typed value into Valuereflect: call of reflect.Value.Len on ptr to non-array Valuemanual span allocation called with non-manually-managed typeaddr range base and li
                • API String ID: 0-1668493485
                • Opcode ID: 83e1674a86f87a9046b469c7572ea7f32069a3e369ec5c775e9e0a1871a05fb8
                • Instruction ID: c038cb838e4ca3aa7fdaf658c9485808d5f177b351248432e695f7bb55ca4ae9
                • Opcode Fuzzy Hash: 83e1674a86f87a9046b469c7572ea7f32069a3e369ec5c775e9e0a1871a05fb8
                • Instruction Fuzzy Hash: EF322172608B90C6DB64DB11E0857AEBF75F786B94F489516EE8E07B95DB78C880CB00

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 834 5a1fe0-5a1fe4 835 5a1fea-5a1ff9 call 5ae7c0 834->835 836 5a2922-5a2927 call 608a60 834->836 840 5a1ffe-5a20e0 835->840 836->834 841 5a20e2-5a20f1 call 60a9a0 840->841 842 5a20f5-5a2123 call 5a2980 840->842 841->842 847 5a2129-5a2145 842->847 848 5a2332-5a2335 842->848 851 5a218c-5a21b7 847->851 852 5a2147-5a2169 call 5ef160 847->852 849 5a233b-5a2357 848->849 850 5a2542-5a2545 848->850 857 5a2359-5a237b call 5ef160 849->857 858 5a23a1-5a23cc 849->858 855 5a254b-5a2567 850->855 856 5a2693-5a26c2 call 5a2940 850->856 853 5a21b9-5a21cd call 60a9a0 851->853 854 5a21d1-5a2204 851->854 882 5a216b-5a217a call 60a9a0 852->882 883 5a217e-5a2188 852->883 853->854 863 5a221c-5a2250 854->863 864 5a2206-5a2218 call 60a9a0 854->864 865 5a2569-5a2588 call 5ef160 855->865 866 5a25a4-5a25cd 855->866 894 5a26c8-5a2788 call 5a2940 * 2 856->894 895 5a291c-5a2921 856->895 899 5a237d-5a238f call 60a9a0 857->899 900 5a2393-5a239d 857->900 860 5a23ce-5a23df call 60a9a0 858->860 861 5a23e3-5a2416 858->861 860->861 873 5a2418-5a242d call 60a9a0 861->873 874 5a2431-5a2465 861->874 878 5a2268-5a229c 863->878 879 5a2252-5a2264 call 60a9a0 863->879 864->863 915 5a258a-5a2599 call 60a9a0 865->915 916 5a259d 865->916 870 5a25cf-5a25e0 call 60a9a0 866->870 871 5a25e4-5a2615 866->871 870->871 886 5a2631-5a2663 871->886 887 5a2617-5a262d call 60a9a0 871->887 873->874 890 5a247d-5a24b1 874->890 891 5a2467-5a2479 call 60a9a0 874->891 896 5a229e-5a22b0 call 60a9a0 878->896 897 5a22b4-5a22f1 878->897 879->878 882->883 883->851 904 5a267b-5a268e 886->904 905 5a2665-5a2677 call 60a9a0 886->905 887->886 908 5a24c9-5a2506 890->908 909 5a24b3-5a24c5 call 60a9a0 890->909 891->890 937 5a278a-5a278e 894->937 938 5a2790-5a27b2 call 5a2960 894->938 896->897 913 5a22f3-5a2310 call 60a9a0 897->913 914 5a2314-5a232a 897->914 899->900 900->858 904->856 905->904 923 5a2508-5a2520 call 60a9a0 908->923 924 5a2524-5a253a 908->924 909->908 913->914 914->848 915->916 916->866 923->924 924->850 939 5a27e1-5a27f7 937->939 945 5a27bd-5a27bf 938->945 946 5a27b4-5a27bb 938->946 941 5a27fd-5a2899 call 5a2940 939->941 942 5a2916-5a291b 939->942 949 5a289b-5a28aa 941->949 950 5a28b1-5a28d9 call 5a2940 941->950 948 5a27c0-5a27c2 945->948 946->948 951 5a27d9 948->951 952 5a27c4-5a27c8 948->952 949->950 958 5a28db-5a28e0 950->958 959 5a28e1-5a2915 call 5a2940 950->959 955 5a27db-5a27dd 951->955 952->951 954 5a27ca-5a27ce 952->954 954->951 957 5a27d0-5a27d7 954->957 955->939 957->955
                Strings
                • ermssse3avx2bmi1bmi2false<nil>Errorfileshttpsimap2imap3imapspop3shostswriteclosechdirLstatMarchApril+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930Localint16int32int64uint8arrayslice and defersweeptestRtestWexecWexecRschedhchansudoggscanmheaptracepanicsleep, xrefs: 005A2041
                • avx512bwavx512vlgo/typesnet/httpgo/buildx509sha1MicrosoftNexus.lnkfiles,dnsdns,filesipv6-icmp_outboundlocalhostconnectexfork/exec#execwaitWednesdaySeptembercomplex64interfaceinvalid nfuncargs(bad indirreflect: InterfaceprofBlockstackpoolhchanLeafwbufSpansmSpan, xrefs: 005A2631
                • pclmulqdqmath/randtlsrsakexStart Menupowershell.localhostsetsockoptunixpacket netGo = /dev/stdinCreateFileexecerrdotSYSTEMROOT%!Weekday(complex128t.Kind == notifyListprofInsertstackLargemSpanInUseGOMAXPROCSstop tracedisablethpinvalidptrschedtracesemacquiredeb, xrefs: 005A205F
                • rdtscppopcntcmd/goAPPDATAWindowsStartupfloat32float64windowsrunningwsarecvwsasendconnectlookup writetoconsolePATHEXT\\.\UNCTuesdayJanuaryOctoberMUI_StdMUI_DltinvaliduintptrChanDir Value>forcegcallocmWcpuprofallocmRunknowngctraceIO waitsyscallwaitingUNKNOWN:eve, xrefs: 005A2080
                • sse41sse42ssse3StringFormat[]bytestringnetdnsdomaingophertelnet.localreturnlisten.onionsocketexec: SundayMondayFridayAugustUTC-11UTC-02UTC-08UTC-09UTC+12UTC+13uint16uint32uint64structchan<-<-chan Valuesysmontimersefenceselect, not object next= jobs= goid sweep, xrefs: 005A2268
                • avx512fos/execruntime#internPrograms-CommandGoStringnetedns0[::1]:53continue_gatewayshutdownaddress readfromwsaioctlunixgramnil PoolFullPathThursdaySaturdayFebruaryNovemberDecember%!Month(scavengepollDesctraceBufdeadlockraceFinipanicnilcgocheckrunnable procid , xrefs: 005A25E4
                • adxaesshaavxfmanet9889trueicmpigmpftpshttppop3smtp) = dialbindfile read on pipeunixopenStat.com.exe.bat.cmdpathJuneJulyEESTSASTAKSTAKDTACSTACDTAESTAEDTAWSTCESTNZSTNZDTboolint8uintchanfunccallkindallgallprootitabsbrkidledead is LEAFbase of <==GOGC] = pc=+I, xrefs: 005A2006
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: adxaesshaavxfmanet9889trueicmpigmpftpshttppop3smtp) = dialbindfile read on pipeunixopenStat.com.exe.bat.cmdpathJuneJulyEESTSASTAKSTAKDTACSTACDTAESTAEDTAWSTCESTNZSTNZDTboolint8uintchanfunccallkindallgallprootitabsbrkidledead is LEAFbase of <==GOGC] = pc=+I$avx512bwavx512vlgo/typesnet/httpgo/buildx509sha1MicrosoftNexus.lnkfiles,dnsdns,filesipv6-icmp_outboundlocalhostconnectexfork/exec#execwaitWednesdaySeptembercomplex64interfaceinvalid nfuncargs(bad indirreflect: InterfaceprofBlockstackpoolhchanLeafwbufSpansmSpan$avx512fos/execruntime#internPrograms-CommandGoStringnetedns0[::1]:53continue_gatewayshutdownaddress readfromwsaioctlunixgramnil PoolFullPathThursdaySaturdayFebruaryNovemberDecember%!Month(scavengepollDesctraceBufdeadlockraceFinipanicnilcgocheckrunnable procid $ermssse3avx2bmi1bmi2false<nil>Errorfileshttpsimap2imap3imapspop3shostswriteclosechdirLstatMarchApril+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930Localint16int32int64uint8arrayslice and defersweeptestRtestWexecWexecRschedhchansudoggscanmheaptracepanicsleep$pclmulqdqmath/randtlsrsakexStart Menupowershell.localhostsetsockoptunixpacket netGo = /dev/stdinCreateFileexecerrdotSYSTEMROOT%!Weekday(complex128t.Kind == notifyListprofInsertstackLargemSpanInUseGOMAXPROCSstop tracedisablethpinvalidptrschedtracesemacquiredeb$rdtscppopcntcmd/goAPPDATAWindowsStartupfloat32float64windowsrunningwsarecvwsasendconnectlookup writetoconsolePATHEXT\\.\UNCTuesdayJanuaryOctoberMUI_StdMUI_DltinvaliduintptrChanDir Value>forcegcallocmWcpuprofallocmRunknowngctraceIO waitsyscallwaitingUNKNOWN:eve$sse41sse42ssse3StringFormat[]bytestringnetdnsdomaingophertelnet.localreturnlisten.onionsocketexec: SundayMondayFridayAugustUTC-11UTC-02UTC-08UTC-09UTC+12UTC+13uint16uint32uint64structchan<-<-chan Valuesysmontimersefenceselect, not object next= jobs= goid sweep
                • API String ID: 0-3864557194
                • Opcode ID: 3e34f6f1a088494b061dc172a4916d1f7965f4983e03fc8dbae2cd0e4945cc4b
                • Instruction ID: 4a890b8dd31e1989b9b8681c7fc73466284db42b71e883cf642f14f3a33ca42b
                • Opcode Fuzzy Hash: 3e34f6f1a088494b061dc172a4916d1f7965f4983e03fc8dbae2cd0e4945cc4b
                • Instruction Fuzzy Hash: AD42BB7A504F80C5E700DF29F84979A3BA1F395F80F958226DAD94B361DF79C6A9C340
                Strings
                • self-preempt [recovered]bad recoverybad g statusentersyscallwirep: p->m=) p->status=releasep: m= sysmonwait= preemptoff=cas64 failed m->gsignal=-byte limitruntime: sp=abi mismatch152587890625762939453125invalid slothost is downillegal seekGetLengthSidGetLastE, xrefs: 005D6EC5
                • runtime.preemptM: duplicatehandle failed; errno=runtime: waitforsingleobject wait_failed; errno=strconv: illegal AppendFloat/FormatFloat bitSizenot enough significant bits after mult64bitPow10syscall: string with NUL passed to StringToUTF16parsing/packing of t, xrefs: 005D6E87
                • runtime.preemptM: duplicatehandle failedglobal runq empty with non-zero runqsizemust be able to track idle limiter eventruntime: SyscallN has too many arguments13877787807814456755295395851135253906256938893903907228377647697925567626953125ryuFtoaFixed32 calle, xrefs: 005D6EAF
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: runtime.preemptM: duplicatehandle failed; errno=runtime: waitforsingleobject wait_failed; errno=strconv: illegal AppendFloat/FormatFloat bitSizenot enough significant bits after mult64bitPow10syscall: string with NUL passed to StringToUTF16parsing/packing of t$runtime.preemptM: duplicatehandle failedglobal runq empty with non-zero runqsizemust be able to track idle limiter eventruntime: SyscallN has too many arguments13877787807814456755295395851135253906256938893903907228377647697925567626953125ryuFtoaFixed32 calle$self-preempt [recovered]bad recoverybad g statusentersyscallwirep: p->m=) p->status=releasep: m= sysmonwait= preemptoff=cas64 failed m->gsignal=-byte limitruntime: sp=abi mismatch152587890625762939453125invalid slothost is downillegal seekGetLengthSidGetLastE
                • API String ID: 0-3009455715
                • Opcode ID: 56410509a630782902b64118ae066c04cd75b29c4c9687fd77c28c662460cd00
                • Instruction ID: b531ebc0fbe3baebaff873ac9329e90a8df31d80666f78ecc3f7a9b869c12454
                • Opcode Fuzzy Hash: 56410509a630782902b64118ae066c04cd75b29c4c9687fd77c28c662460cd00
                • Instruction Fuzzy Hash: F6C15C36605F8181CB60DB29E88536F7B60F78AB90F159237DAAC537A5DF39C492CB40
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: .`$PowerRegisterSuspendResumeNotification$powrprof.dll
                • API String ID: 0-3225791698
                • Opcode ID: 44d24f89154824cc11c56763e591cdb9fb0a85941e7be42b470fd5cd78009dba
                • Instruction ID: d4b71b9a5f23b08059bcaed383d006c7da76e548a94d80c93fcd5a20e3e35d9e
                • Opcode Fuzzy Hash: 44d24f89154824cc11c56763e591cdb9fb0a85941e7be42b470fd5cd78009dba
                • Instruction Fuzzy Hash: 58214836209F84C6DB10CF15F44536ABBA5F38AB80F488516EACC47B58DF79C195CB40
                Strings
                • grew heap, but no adequate free space foundroot level max pages doesn't fit in summaryruntime: releaseSudog with non-nil gp.paramunknown runnable goroutine during bootstrapruntime: casfrom_Gscanstatus bad oldval gp=runtime:stoplockedm: lockedg (atomicstatus=me, xrefs: 005CA082
                • @E`, xrefs: 005C9EB3
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: @E`$grew heap, but no adequate free space foundroot level max pages doesn't fit in summaryruntime: releaseSudog with non-nil gp.paramunknown runnable goroutine during bootstrapruntime: casfrom_Gscanstatus bad oldval gp=runtime:stoplockedm: lockedg (atomicstatus=me
                • API String ID: 0-1755309879
                • Opcode ID: a0976dc51cec0492eb393a7fbc7454ee0aa4962e3576eeafc5765aade38bd967
                • Instruction ID: e2bb0059010f2057727233c13f81255dee0d2edee22af2551b5bb7ec7f498d9b
                • Opcode Fuzzy Hash: a0976dc51cec0492eb393a7fbc7454ee0aa4962e3576eeafc5765aade38bd967
                • Instruction Fuzzy Hash: 42E18E32209B8489DB60CF55E494B9ABF61F786BD0F58951AEECD43B69CF38C494CB40
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID: Recv
                • String ID:
                • API String ID: 4192927123-0
                • Opcode ID: d0420e7b245c68536b1289b904fe6097933a37c154ff1c15fd575de53d0a58cb
                • Instruction ID: 059f93c86ec3ecc698348d304a65272684870ce54c0fc3c94bea9e5df61f300d
                • Opcode Fuzzy Hash: d0420e7b245c68536b1289b904fe6097933a37c154ff1c15fd575de53d0a58cb
                • Instruction Fuzzy Hash: BB117C36A40B80C1DB248B1AE8413697370E348BF4F244365DEAD57BA5CB28E1A2C740
                Strings
                • span has no free objectsruntime: found obj at *(runtime: VirtualFree of /cgo/go-to-c-calls:calls/gc/heap/objects:objects/sched/latencies:secondsqueuefinalizer during GCupdate during transitionruntime: markroot index can't scan our own stackgcDrainN phase incor, xrefs: 005B7090
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: span has no free objectsruntime: found obj at *(runtime: VirtualFree of /cgo/go-to-c-calls:calls/gc/heap/objects:objects/sched/latencies:secondsqueuefinalizer during GCupdate during transitionruntime: markroot index can't scan our own stackgcDrainN phase incor
                • API String ID: 0-1712010102
                • Opcode ID: 62ad128bf3858c0174402c8d5a1fc9a2e917c769831a02d662e6d7d7b8206458
                • Instruction ID: 14778a4e72cb54c89bf653a490f2f8d28b41f0561025b239e16498fbe7e1b10d
                • Opcode Fuzzy Hash: 62ad128bf3858c0174402c8d5a1fc9a2e917c769831a02d662e6d7d7b8206458
                • Instruction Fuzzy Hash: B1C1D432209B458ADF14DB14E4947AEBBA1F7C5B44F04452AEB8E07BA9DF3CE944CB50
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 63743188d5dbba73dcc8777889c975756452f22b3ee0f1ee15213252e74e5086
                • Instruction ID: fa1bc41ef3dc3e2639b02ffa2d96c7718271ff255f22e7b50d6816081f66e5f2
                • Opcode Fuzzy Hash: 63743188d5dbba73dcc8777889c975756452f22b3ee0f1ee15213252e74e5086
                • Instruction Fuzzy Hash: 1CC1903260DB8486DB08DF26E49036ABB65F7CAB80F985525EACD43765DF7CD844CB00
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 76bc640c0164ddc80bb4159aea91c468d8542978f64eb93f64102dbc53455c5d
                • Instruction ID: 20977e8c93ddb14e3c55a52a97dbf8d155dc8602b5915ad25ccecdb47b1efabf
                • Opcode Fuzzy Hash: 76bc640c0164ddc80bb4159aea91c468d8542978f64eb93f64102dbc53455c5d
                • Instruction Fuzzy Hash: 53910675A09680CADB189F16E49036A7F61F7C1B84F98A035C98D073A5DFBDD8D5CB80
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 921a085b0a0f9ff61c8d2173f54fd059379f42d3a4404dcd6b8cdce61aa9b4f7
                • Instruction ID: e118c773f84b9fed97e12a5ed701812debdb7b2640bd283db58943afe3b5a68f
                • Opcode Fuzzy Hash: 921a085b0a0f9ff61c8d2173f54fd059379f42d3a4404dcd6b8cdce61aa9b4f7
                • Instruction Fuzzy Hash: 873166BA309B4A91DB449B19E4813EA6B62F3C4BC0F85D036DE4E57769CE38D64BC340
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: cdd6910b81359d82a000ccbee3a73faa141a11c2b4a33abe83676cd268d41d19
                • Instruction ID: 1a8de4d333711c9b55e87c3e309f0919a576add7a207c6b1b9ed603e1bec41a4
                • Opcode Fuzzy Hash: cdd6910b81359d82a000ccbee3a73faa141a11c2b4a33abe83676cd268d41d19
                • Instruction Fuzzy Hash: 16214C33608B8582CB10CB25F48636B6B60F386BD4F449223EE9D47B99DB38C191CB40
                Strings
                • MB goal, s.state = s.base()= heapGoal=GOMEMLIMIT KiB now, pages at sweepgen= sweepgen , bound = , limit = tracefree(tracegc()exitThreadBad varintGC forced runqueue= stopwait= runqsize= gfreecnt= throwing= spinning=atomicand8float64nanfloat32nanException , xrefs: 005BC545
                • failed to set sweep barrierwork.nwait was > work.nproc not in stack roots range [allocated pages below zero?address not a stack addressmspan.sweep: bad span stateinvalid profile bucket typeruntime: corrupted polldescruntime: netpollinit failedruntime: asyncPre, xrefs: 005BC789
                • ms clock, nBSSRoots=runtime: P exp.) for minTrigger=GOMEMLIMIT=bad m value, elemsize= freeindex= span.list=, npages = tracealloc( p->status= in status idleprocs= gcwaiting= schedtick= timerslen= mallocing=bad timedivfloat64nan1float64nan2float64nan3float32, xrefs: 005BC2AA
                • gc done but gcphase != _GCoffruntime: p.gcMarkWorkerMode= scanobject of a noscan objectruntime: marking free object addspecial on invalid pointerruntime: summary max pages = runtime: levelShift[level] = doRecordGoroutineProfile gp1=timeBegin/EndPeriod not foun, xrefs: 005BC79A
                • ms cpu, (forced) wbuf1.n= wbuf2.n= s.limit= s.state= B work ( B exp.) marked unmarked in use), size = bad prune, tail = recover: not in [ctxt != 0, oldval=, newval= threads=: status= blocked= lockedg=atomicor8 runtime= m->curg=(unknown)traceback} stack=, xrefs: 005BC4CB
                • @s Pn=][}]> +25])idLlLtLuMn"tcpEOF???nilcgodnsudpftpssh::1set\\?NUL:\/\\.\??MayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08IDT+12PKT+11KST+05JST+10-01-11-12-08-09+13CETBSTMSK-06+14 m=StdDltintmap, xrefs: 005BC12C
                • , xrefs: 005BBF7F
                • 2`, xrefs: 005BC6DF
                • MB globals, work.nproc= work.nwait= nStackRoots= flushedWork double unlock s.spanclass= MB) workers=min too large-byte block (runtime: val=runtime: seq=fatal error: idlethreads= syscalltick=load64 failedxadd64 failedxchg64 failednil stackbase}sched={pc:, xrefs: 005BC585
                • non-concurrent sweep failed to drain all sweep queuescompileCallback: argument size is larger than uintptrmin size of malloc header is not a size class boundarygcControllerState.findRunnable: blackening not enabledno goroutines (main called runtime.Goexit) - d, xrefs: 005BC778
                • ., xrefs: 005BC08A
                • gc %: gp *(in n= ) - NaN P MPC= < end > ]:pc= G125625): TTLadxaesshaavxfmanet9889trueicmpigmpftpshttppop3smtp) = dialbindfile read on pipeunixopenStat.com.exe.bat.cmdpathJuneJulyEESTSASTAKSTAKDTACSTACDTAESTAEDTAWSTCESTNZSTNZDTboolint8uintchanfunccall, xrefs: 005BC10E
                • gcing MB, got= ... max=scav ptr ] = (usageinit ms, fault tab= top=[...], fp:1562578125 (at ntohsClassGreeksse41sse42ssse3StringFormat[]bytestringnetdnsdomaingophertelnet.localreturnlisten.onionsocketexec: SundayMondayFridayAugustUTC-11UTC-02UTC-08UTC-09UTC, xrefs: 005BBA64
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: $ @s Pn=][}]> +25])idLlLtLuMn"tcpEOF???nilcgodnsudpftpssh::1set\\?NUL:\/\\.\??MayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08IDT+12PKT+11KST+05JST+10-01-11-12-08-09+13CETBSTMSK-06+14 m=StdDltintmap$ MB globals, work.nproc= work.nwait= nStackRoots= flushedWork double unlock s.spanclass= MB) workers=min too large-byte block (runtime: val=runtime: seq=fatal error: idlethreads= syscalltick=load64 failedxadd64 failedxchg64 failednil stackbase}sched={pc:$ MB goal, s.state = s.base()= heapGoal=GOMEMLIMIT KiB now, pages at sweepgen= sweepgen , bound = , limit = tracefree(tracegc()exitThreadBad varintGC forced runqueue= stopwait= runqsize= gfreecnt= throwing= spinning=atomicand8float64nanfloat32nanException $ ms clock, nBSSRoots=runtime: P exp.) for minTrigger=GOMEMLIMIT=bad m value, elemsize= freeindex= span.list=, npages = tracealloc( p->status= in status idleprocs= gcwaiting= schedtick= timerslen= mallocing=bad timedivfloat64nan1float64nan2float64nan3float32$ ms cpu, (forced) wbuf1.n= wbuf2.n= s.limit= s.state= B work ( B exp.) marked unmarked in use), size = bad prune, tail = recover: not in [ctxt != 0, oldval=, newval= threads=: status= blocked= lockedg=atomicor8 runtime= m->curg=(unknown)traceback} stack=$.$failed to set sweep barrierwork.nwait was > work.nproc not in stack roots range [allocated pages below zero?address not a stack addressmspan.sweep: bad span stateinvalid profile bucket typeruntime: corrupted polldescruntime: netpollinit failedruntime: asyncPre$gc %: gp *(in n= ) - NaN P MPC= < end > ]:pc= G125625): TTLadxaesshaavxfmanet9889trueicmpigmpftpshttppop3smtp) = dialbindfile read on pipeunixopenStat.com.exe.bat.cmdpathJuneJulyEESTSASTAKSTAKDTACSTACDTAESTAEDTAWSTCESTNZSTNZDTboolint8uintchanfunccall$gc done but gcphase != _GCoffruntime: p.gcMarkWorkerMode= scanobject of a noscan objectruntime: marking free object addspecial on invalid pointerruntime: summary max pages = runtime: levelShift[level] = doRecordGoroutineProfile gp1=timeBegin/EndPeriod not foun$gcing MB, got= ... max=scav ptr ] = (usageinit ms, fault tab= top=[...], fp:1562578125 (at ntohsClassGreeksse41sse42ssse3StringFormat[]bytestringnetdnsdomaingophertelnet.localreturnlisten.onionsocketexec: SundayMondayFridayAugustUTC-11UTC-02UTC-08UTC-09UTC$non-concurrent sweep failed to drain all sweep queuescompileCallback: argument size is larger than uintptrmin size of malloc header is not a size class boundarygcControllerState.findRunnable: blackening not enabledno goroutines (main called runtime.Goexit) - d$2`
                • API String ID: 0-507349935
                • Opcode ID: 4ad0eded2a40d559762a26ab8440cea37433f031f210859abd0fcb0f5aa207df
                • Instruction ID: b8ca16ae480f5514141c5bffd74150692b6d6d3a88ea0423867ada3a3e8cb0ae
                • Opcode Fuzzy Hash: 4ad0eded2a40d559762a26ab8440cea37433f031f210859abd0fcb0f5aa207df
                • Instruction Fuzzy Hash: E372AC36609BC5C5EB61DB28E8853EBBB65F78AB80F448126DA8C0376ADF7CD144C750
                Strings
                • runtime: p.searchAddr = range partially overlapsstack trace unavailablebindm in unexpected GOOSrunqsteal: runq overflowdouble traceGCSweepStartbad use of trace.seqlock116415321826934814453125582076609134674072265625address string too shortfloating point excep, xrefs: 005CD365
                • , levelBits[level] = runtime: searchIdx = defer on system stackpanic on system stackasync stack too largestartm: m is spinningstartlockedm: m has pfindrunnable: wrong ppreempt at unknown pcreleasep: invalid argcheckdead: runnable gruntime: newstack at runtime:, xrefs: 005CD405
                • runtime: npages = runtime: range = {index out of rangeruntime: gp: gp=runtime: getg: g=forEachP: not done in async preemptbad manualFreeListruntime: textAddr cleantimers: bad p frames elided..., locked to threadruntime.semacreateruntime.semawakeup29802322, xrefs: 005CCEAF
                • ] = (usageinit ms, fault tab= top=[...], fp:1562578125 (at ntohsClassGreeksse41sse42ssse3StringFormat[]bytestringnetdnsdomaingophertelnet.localreturnlisten.onionsocketexec: SundayMondayFridayAugustUTC-11UTC-02UTC-08UTC-09UTC+12UTC+13uint16uint32uint64structch, xrefs: 005CCE38
                • , npages = tracealloc( p->status= in status idleprocs= gcwaiting= schedtick= timerslen= mallocing=bad timedivfloat64nan1float64nan2float64nan3float32nan2GOTRACEBACK) at entry+ (targetpc= , plugin: runtime: g : frame.sp=created by 30517578125broken pipealarm c, xrefs: 005CD2FC
                • bad summary dataruntime: addr = runtime: base = runtime: head = timeBeginPeriod, xrefs: 005CCEDC, 005CD62C
                • , j0 = head = panic: nmsys= locks= dying= allocsGODEBUG m->g0= pad1= pad2= text= minpc= value= (scan)types : type 19531259765625::ffff:abortedCopySidWSARecvWSASendsignal nil keyanswersavx512fos/execruntime#internPrograms-CommandGoStringnetedns0[::1]:53con, xrefs: 005CD31A
                • ] = pc=+Inf-Inf: p=cas1cas2cas3cas4cas5cas6 at m= sp= sp: lr: fp= gp= mp=) m=3125quitbitsNameTypeermssse3avx2bmi1bmi2false<nil>Errorfileshttpsimap2imap3imapspop3shostswriteclosechdirLstatMarchApril+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930Localint16, xrefs: 005CD276
                • , i = code= addr= m->p= p->m=SCHED curg= ctxt: min= max= (...) m=nil base 390625hangupkilled, val headerAnswerLengthGetACPCommonrdtscppopcntcmd/goAPPDATAWindowsStartupfloat32float64windowsrunningwsarecvwsasendconnectlookup writetoconsolePATHEXT\\.\UNCTuesd, xrefs: 005CD385
                • runtime: levelShift[level] = doRecordGoroutineProfile gp1=timeBegin/EndPeriod not foundruntime: sudog with non-nil cgfput: bad status (not Gdead)LockOSThread nesting overflowsemacquire not on the G stackruntime: split stack overflowstring concatenation too lon, xrefs: 005CD3E5
                • runtime: summary[runtime: level = , p.searchAddr = RtlGetCurrentPeb, xrefs: 005CCDFF, 005CD236
                • ][}]> +25])idLlLtLuMn"tcpEOF???nilcgodnsudpftpssh::1set\\?NUL:\/\\.\??MayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08IDT+12PKT+11KST+05JST+10-01-11-12-08-09+13CETBSTMSK-06+14 m=StdDltintmapptr...fi, xrefs: 005CCE1A, 005CD25B
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: , i = code= addr= m->p= p->m=SCHED curg= ctxt: min= max= (...) m=nil base 390625hangupkilled, val headerAnswerLengthGetACPCommonrdtscppopcntcmd/goAPPDATAWindowsStartupfloat32float64windowsrunningwsarecvwsasendconnectlookup writetoconsolePATHEXT\\.\UNCTuesd$, j0 = head = panic: nmsys= locks= dying= allocsGODEBUG m->g0= pad1= pad2= text= minpc= value= (scan)types : type 19531259765625::ffff:abortedCopySidWSARecvWSASendsignal nil keyanswersavx512fos/execruntime#internPrograms-CommandGoStringnetedns0[::1]:53con$, levelBits[level] = runtime: searchIdx = defer on system stackpanic on system stackasync stack too largestartm: m is spinningstartlockedm: m has pfindrunnable: wrong ppreempt at unknown pcreleasep: invalid argcheckdead: runnable gruntime: newstack at runtime:$, npages = tracealloc( p->status= in status idleprocs= gcwaiting= schedtick= timerslen= mallocing=bad timedivfloat64nan1float64nan2float64nan3float32nan2GOTRACEBACK) at entry+ (targetpc= , plugin: runtime: g : frame.sp=created by 30517578125broken pipealarm c$] = pc=+Inf-Inf: p=cas1cas2cas3cas4cas5cas6 at m= sp= sp: lr: fp= gp= mp=) m=3125quitbitsNameTypeermssse3avx2bmi1bmi2false<nil>Errorfileshttpsimap2imap3imapspop3shostswriteclosechdirLstatMarchApril+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930Localint16$] = (usageinit ms, fault tab= top=[...], fp:1562578125 (at ntohsClassGreeksse41sse42ssse3StringFormat[]bytestringnetdnsdomaingophertelnet.localreturnlisten.onionsocketexec: SundayMondayFridayAugustUTC-11UTC-02UTC-08UTC-09UTC+12UTC+13uint16uint32uint64structch$][}]> +25])idLlLtLuMn"tcpEOF???nilcgodnsudpftpssh::1set\\?NUL:\/\\.\??MayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08IDT+12PKT+11KST+05JST+10-01-11-12-08-09+13CETBSTMSK-06+14 m=StdDltintmapptr...fi$bad summary dataruntime: addr = runtime: base = runtime: head = timeBeginPeriod$runtime: levelShift[level] = doRecordGoroutineProfile gp1=timeBegin/EndPeriod not foundruntime: sudog with non-nil cgfput: bad status (not Gdead)LockOSThread nesting overflowsemacquire not on the G stackruntime: split stack overflowstring concatenation too lon$runtime: npages = runtime: range = {index out of rangeruntime: gp: gp=runtime: getg: g=forEachP: not done in async preemptbad manualFreeListruntime: textAddr cleantimers: bad p frames elided..., locked to threadruntime.semacreateruntime.semawakeup29802322$runtime: p.searchAddr = range partially overlapsstack trace unavailablebindm in unexpected GOOSrunqsteal: runq overflowdouble traceGCSweepStartbad use of trace.seqlock116415321826934814453125582076609134674072265625address string too shortfloating point excep$runtime: summary[runtime: level = , p.searchAddr = RtlGetCurrentPeb
                • API String ID: 0-1627350362
                • Opcode ID: 61e5b8b19802e768d507b787fa04597d64d61f0a01c0da1a4820f4827f72f971
                • Instruction ID: 695782d4eb5d233faa37d73375be7b8647b81fee79556c55c46c264eaf2d80b0
                • Opcode Fuzzy Hash: 61e5b8b19802e768d507b787fa04597d64d61f0a01c0da1a4820f4827f72f971
                • Instruction Fuzzy Hash: 0632DE76714B8981EB20DB55E4857DABB26F789BC0F404027DE8D17B6ADF38C945C701
                Strings
                • runtime.SetFinalizer: cannot pass too many pages allocated in chunk?mspan.ensureSwept: m is not lockedVirtualQuery for stack base failedforEachP: sched.safePointWait != 0schedule: spinning with local workruntime: g is running but p is notdoaddtimer: P already , xrefs: 005BA4A3, 005BA4F7, 005BA561
                • runtime.SetFinalizer: first argument is failed to acquire lock to reset capacitymarkWorkerStop: unknown mark worker modecannot free workbufs when work.full != 0runtime: out of memory: cannot allocate runtime.preemptM: duplicatehandle failedglobal runq empty wi, xrefs: 005BA67F
                • runtime.SetFinalizer: second argument is gcSweep being done but phase is not GCoffobjects added out of order or overlappingmheap.freeSpanLocked - invalid stack freemheap.freeSpanLocked - invalid span stateattempted to add zero-sized address rangeruntime: block, xrefs: 005BA594
                • nil elem type! to finalizer GC worker initruntime: full=runtime: want=MB; allocated timeEndPeriod, xrefs: 005BA64D
                • because dotdotdotruntime: npages = runtime: range = {index out of rangeruntime: gp: gp=runtime: getg: g=forEachP: not done in async preemptbad manualFreeListruntime: textAddr cleantimers: bad p frames elided..., locked to threadruntime.semacreateruntime., xrefs: 005BA526
                • runtime.SetFinalizer: pointer not in allocated blockruntime: use of FixAlloc_Alloc before FixAlloc_Initspan set block with unpopped elements found in resetruntime: GetQueuedCompletionStatusEx failed (errno= casfrom_Gscanstatus: gp->status is not in scan state, xrefs: 005BA62B
                • , not a functiongc: unswept span KiB work (bg), mheap.sweepgen=runtime: nelems=workbuf is emptymSpanList.removemSpanList.insertbad special kindbad summary dataruntime: addr = runtime: base = runtime: head = timeBeginPeriod, xrefs: 005BA585
                • runtime.SetFinalizer: first argument was allocated into an arenacompileCallback: expected function with one uintptr-sized resultuser arena chunk size is not a multiple of the physical page sizeruntime: function marked with #cgo nocallback called back into Goru, xrefs: 005BA63C
                • , not pointer != sweepgen MB globals, work.nproc= work.nwait= nStackRoots= flushedWork double unlock s.spanclass= MB) workers=min too large-byte block (runtime: val=runtime: seq=fatal error: idlethreads= syscalltick=load64 failedxadd64 failedxchg64 failed, xrefs: 005BA670
                • runtime.SetFinalizer: first argument is nilruntime.SetFinalizer: finalizer already setgcBgMarkWorker: unexpected gcMarkWorkerModenon in-use span found with specials bit setgrew heap, but no adequate free space foundroot level max pages doesn't fit in summaryru, xrefs: 005BA690
                • runtime.SetFinalizer: pointer not at beginning of allocated blockunable to query buffer size from InitializeProcThreadAttributeListreflect: reflect.Value.UnsafePointer on an invalid notinheap pointerembedded IPv4 address must replace the final 2 fields of the , xrefs: 005BA5AA
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: because dotdotdotruntime: npages = runtime: range = {index out of rangeruntime: gp: gp=runtime: getg: g=forEachP: not done in async preemptbad manualFreeListruntime: textAddr cleantimers: bad p frames elided..., locked to threadruntime.semacreateruntime.$, not a functiongc: unswept span KiB work (bg), mheap.sweepgen=runtime: nelems=workbuf is emptymSpanList.removemSpanList.insertbad special kindbad summary dataruntime: addr = runtime: base = runtime: head = timeBeginPeriod$, not pointer != sweepgen MB globals, work.nproc= work.nwait= nStackRoots= flushedWork double unlock s.spanclass= MB) workers=min too large-byte block (runtime: val=runtime: seq=fatal error: idlethreads= syscalltick=load64 failedxadd64 failedxchg64 failed$nil elem type! to finalizer GC worker initruntime: full=runtime: want=MB; allocated timeEndPeriod$runtime.SetFinalizer: cannot pass too many pages allocated in chunk?mspan.ensureSwept: m is not lockedVirtualQuery for stack base failedforEachP: sched.safePointWait != 0schedule: spinning with local workruntime: g is running but p is notdoaddtimer: P already $runtime.SetFinalizer: first argument is failed to acquire lock to reset capacitymarkWorkerStop: unknown mark worker modecannot free workbufs when work.full != 0runtime: out of memory: cannot allocate runtime.preemptM: duplicatehandle failedglobal runq empty wi$runtime.SetFinalizer: first argument is nilruntime.SetFinalizer: finalizer already setgcBgMarkWorker: unexpected gcMarkWorkerModenon in-use span found with specials bit setgrew heap, but no adequate free space foundroot level max pages doesn't fit in summaryru$runtime.SetFinalizer: first argument was allocated into an arenacompileCallback: expected function with one uintptr-sized resultuser arena chunk size is not a multiple of the physical page sizeruntime: function marked with #cgo nocallback called back into Goru$runtime.SetFinalizer: pointer not at beginning of allocated blockunable to query buffer size from InitializeProcThreadAttributeListreflect: reflect.Value.UnsafePointer on an invalid notinheap pointerembedded IPv4 address must replace the final 2 fields of the $runtime.SetFinalizer: pointer not in allocated blockruntime: use of FixAlloc_Alloc before FixAlloc_Initspan set block with unpopped elements found in resetruntime: GetQueuedCompletionStatusEx failed (errno= casfrom_Gscanstatus: gp->status is not in scan state$runtime.SetFinalizer: second argument is gcSweep being done but phase is not GCoffobjects added out of order or overlappingmheap.freeSpanLocked - invalid stack freemheap.freeSpanLocked - invalid span stateattempted to add zero-sized address rangeruntime: block
                • API String ID: 0-1037468882
                • Opcode ID: 1032913427acd2686ec149b72338c429a8c62e88d30a3f23f699d5c7568ad228
                • Instruction ID: 7310f97c2ca5d4ed9227e9df32f526c48201db442a2abec13b09d5942ff608d2
                • Opcode Fuzzy Hash: 1032913427acd2686ec149b72338c429a8c62e88d30a3f23f699d5c7568ad228
                • Instruction Fuzzy Hash: 71F1D032609BC081EB609F25E4413EEBBA6F785B80F488536DB8D07B99DF79E594C701
                Strings
                • untyped locals missing stackmapbad symbol tablenon-Go function not in ranges:23841857910156250123456789ABCDEFinvalid exchangeno route to hostinvalid argumentmessage too longobject is remoteremote I/O errorSetFilePointerExOpenProcessTokenRegQueryInfoKeyWRegQ, xrefs: 005F2A4C
                • bad symbol tablenon-Go function not in ranges:23841857910156250123456789ABCDEFinvalid exchangeno route to hostinvalid argumentmessage too longobject is remoteremote I/O errorSetFilePointerExOpenProcessTokenRegQueryInfoKeyWRegQueryValueExWDnsNameCompare_WCrea, xrefs: 005F286A, 005F29EA
                • runtime: pcdata is bad ABI descriptiondodeltimer: wrong Padjusttimers: bad p14901161193847656257450580596923828125skip this directoryillegal instructionbad file descriptordisk quota exceededtoo many open filesdevice not a streamdirectory not emptyCryptReleaseC, xrefs: 005F27D3, 005F295F
                • missing stackmapbad symbol tablenon-Go function not in ranges:23841857910156250123456789ABCDEFinvalid exchangeno route to hostinvalid argumentmessage too longobject is remoteremote I/O errorSetFilePointerExOpenProcessTokenRegQueryInfoKeyWRegQueryValueExWDnsN, xrefs: 005F2919, 005F2A99
                • (targetpc= , plugin: runtime: g : frame.sp=created by 30517578125broken pipealarm clockbad messagefile existsbad addressRegCloseKeyCreateFileWDeleteFileWExitProcessFreeLibrarySetFileTimeVirtualLockWSARecvFromclosesocketgetpeernamegetsocknamecrypt32.dllmswsock, xrefs: 005F2837, 005F29B8
                • and defersweeptestRtestWexecWexecRschedhchansudoggscanmheaptracepanicsleep cnt=gcing MB, got= ... max=scav ptr ] = (usageinit ms, fault tab= top=[...], fp:1562578125 (at ntohsClassGreeksse41sse42ssse3StringFormat[]bytestringnetdnsdomaingophertelnet.localr, xrefs: 005F27EF, 005F297A
                • untyped args out of range no module dataruntime: seq1=runtime: goid= in goroutine 1907348632812595367431640625file too largeis a directorylevel 2 haltedlevel 3 haltedtoo many linksno such deviceprotocol errortext file busytoo many usersCryptGenRandomCertClos, xrefs: 005F28D7
                • locals stack map entries for abi mismatch detected between runtime: impossible type kind unsafe.Slice: len out of range227373675443232059478759765625trailing garbage after addresssocket operation on non-socketinappropriate ioctl for deviceprotocol wrong type , xrefs: 005F2995
                • runtime: frame runtimer: bad ptraceback stuck476837158203125advertise errorkey has expirednetwork is downno medium foundno such processGetAdaptersInfoCreateHardLinkWDeviceIoControlFlushViewOfFileGetCommandLineWGetStartupInfoWProcess32FirstWUnmapViewOfFileFaile, xrefs: 005F28B4, 005F2A29
                • args stack map entries for invalid runtime symbol tableruntime: no module data for traceRegion: alloc too large[originating from goroutine 18189894035458564758300781259094947017729282379150390625file descriptor in bad statedestination address requiredprotocol, xrefs: 005F280F
                • ) @s Pn=][}]> +25])idLlLtLuMn"tcpEOF???nilcgodnsudpftpssh::1set\\?NUL:\/\\.\??MayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08IDT+12PKT+11KST+05JST+10-01-11-12-08-09+13CETBSTMSK-06+14 m=StdDltintm, xrefs: 005F2852, 005F29D3
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: (targetpc= , plugin: runtime: g : frame.sp=created by 30517578125broken pipealarm clockbad messagefile existsbad addressRegCloseKeyCreateFileWDeleteFileWExitProcessFreeLibrarySetFileTimeVirtualLockWSARecvFromclosesocketgetpeernamegetsocknamecrypt32.dllmswsock$ and defersweeptestRtestWexecWexecRschedhchansudoggscanmheaptracepanicsleep cnt=gcing MB, got= ... max=scav ptr ] = (usageinit ms, fault tab= top=[...], fp:1562578125 (at ntohsClassGreeksse41sse42ssse3StringFormat[]bytestringnetdnsdomaingophertelnet.localr$ args stack map entries for invalid runtime symbol tableruntime: no module data for traceRegion: alloc too large[originating from goroutine 18189894035458564758300781259094947017729282379150390625file descriptor in bad statedestination address requiredprotocol$ locals stack map entries for abi mismatch detected between runtime: impossible type kind unsafe.Slice: len out of range227373675443232059478759765625trailing garbage after addresssocket operation on non-socketinappropriate ioctl for deviceprotocol wrong type $ untyped args out of range no module dataruntime: seq1=runtime: goid= in goroutine 1907348632812595367431640625file too largeis a directorylevel 2 haltedlevel 3 haltedtoo many linksno such deviceprotocol errortext file busytoo many usersCryptGenRandomCertClos$ untyped locals missing stackmapbad symbol tablenon-Go function not in ranges:23841857910156250123456789ABCDEFinvalid exchangeno route to hostinvalid argumentmessage too longobject is remoteremote I/O errorSetFilePointerExOpenProcessTokenRegQueryInfoKeyWRegQ$) @s Pn=][}]> +25])idLlLtLuMn"tcpEOF???nilcgodnsudpftpssh::1set\\?NUL:\/\\.\??MayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08IDT+12PKT+11KST+05JST+10-01-11-12-08-09+13CETBSTMSK-06+14 m=StdDltintm$bad symbol tablenon-Go function not in ranges:23841857910156250123456789ABCDEFinvalid exchangeno route to hostinvalid argumentmessage too longobject is remoteremote I/O errorSetFilePointerExOpenProcessTokenRegQueryInfoKeyWRegQueryValueExWDnsNameCompare_WCrea$missing stackmapbad symbol tablenon-Go function not in ranges:23841857910156250123456789ABCDEFinvalid exchangeno route to hostinvalid argumentmessage too longobject is remoteremote I/O errorSetFilePointerExOpenProcessTokenRegQueryInfoKeyWRegQueryValueExWDnsN$runtime: frame runtimer: bad ptraceback stuck476837158203125advertise errorkey has expirednetwork is downno medium foundno such processGetAdaptersInfoCreateHardLinkWDeviceIoControlFlushViewOfFileGetCommandLineWGetStartupInfoWProcess32FirstWUnmapViewOfFileFaile$runtime: pcdata is bad ABI descriptiondodeltimer: wrong Padjusttimers: bad p14901161193847656257450580596923828125skip this directoryillegal instructionbad file descriptordisk quota exceededtoo many open filesdevice not a streamdirectory not emptyCryptReleaseC
                • API String ID: 0-69468158
                • Opcode ID: 0a21d9e6d972597353015af105affa5f0726e1970d568dc16956b30115f7332f
                • Instruction ID: ef7de46498abbe4aa1102be828815c1dcae2d48a7ab7139da362835b68427575
                • Opcode Fuzzy Hash: 0a21d9e6d972597353015af105affa5f0726e1970d568dc16956b30115f7332f
                • Instruction Fuzzy Hash: 9BE1A176208B8986EB20EB69E48536FBB66F788B80F504127EB8D47765DF7CC544CB00
                Strings
                • sweep: tried to preserve a user arena spanruntime: blocked write on closing polldescacquireSudog: found s.elem != nil in cachefatal error: cgo callback before cgo callon a locked thread with no template threadunexpected signal during runtime executionattempte, xrefs: 005C701C
                • mspan.sweep: bad span stateinvalid profile bucket typeruntime: corrupted polldescruntime: netpollinit failedruntime: asyncPreemptStack=runtime: thread ID overflowstopTheWorld: holding locksgcstopm: not waiting for gcinternal lockOSThread errorruntime: checkdea, xrefs: 005C748A
                • nalloc= nfreed=[signal newval= mcount= bytes, stack=[ minLC= maxpc= stack=[ minutes etypes 48828125no anodeCancelIoReadFileAcceptExWSAIoctlClassANYQuestionavx512bwavx512vlgo/typesnet/httpgo/buildx509sha1MicrosoftNexus.lnkfiles,dnsdns,filesipv6-icmp_outbou, xrefs: 005C7108
                • swept cached spanmarkBits overflowruntime: summary[runtime: level = , p.searchAddr = RtlGetCurrentPeb, xrefs: 005C702D
                • previous allocCount=, levelBits[level] = runtime: searchIdx = defer on system stackpanic on system stackasync stack too largestartm: m is spinningstartlockedm: m has pfindrunnable: wrong ppreempt at unknown pcreleasep: invalid argcheckdead: runnable gruntime:, xrefs: 005C7125
                • sweep increased allocation countremovespecial on invalid pointerruntime: root level max pages = WSAGetOverlappedResult not found_cgo_pthread_key_created missingruntime: sudog with non-nil elemruntime: sudog with non-nil nextruntime: sudog with non-nil prevrunt, xrefs: 005C716F
                • sweepgen= sweepgen , bound = , limit = tracefree(tracegc()exitThreadBad varintGC forced runqueue= stopwait= runqsize= gfreecnt= throwing= spinning=atomicand8float64nanfloat32nanException ptrSize= targetpc= until pc=unknown pcruntime: ggoroutine 1220703125, xrefs: 005C706F, 005C7445
                • mspan.sweep: bad span state after sweepruntime: blocked write on free polldescPowerRegisterSuspendResumeNotification, xrefs: 005C70B8
                • mheap.sweepgen=runtime: nelems=workbuf is emptymSpanList.removemSpanList.insertbad special kindbad summary dataruntime: addr = runtime: base = runtime: head = timeBeginPeriod, xrefs: 005C708F, 005C7465
                • mspan.sweep: m is not lockedfound pointer to free objectmheap.freeSpanLocked - span runtime.semasleep unexpectedfatal: morestack on gsignalruntime: casgstatus: oldval=gcstopm: negative nmspinningfindrunnable: netpoll with psave on system g not allowednewproc1, xrefs: 005C749B
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: mheap.sweepgen=runtime: nelems=workbuf is emptymSpanList.removemSpanList.insertbad special kindbad summary dataruntime: addr = runtime: base = runtime: head = timeBeginPeriod$ nalloc= nfreed=[signal newval= mcount= bytes, stack=[ minLC= maxpc= stack=[ minutes etypes 48828125no anodeCancelIoReadFileAcceptExWSAIoctlClassANYQuestionavx512bwavx512vlgo/typesnet/httpgo/buildx509sha1MicrosoftNexus.lnkfiles,dnsdns,filesipv6-icmp_outbou$ previous allocCount=, levelBits[level] = runtime: searchIdx = defer on system stackpanic on system stackasync stack too largestartm: m is spinningstartlockedm: m has pfindrunnable: wrong ppreempt at unknown pcreleasep: invalid argcheckdead: runnable gruntime:$ sweepgen= sweepgen , bound = , limit = tracefree(tracegc()exitThreadBad varintGC forced runqueue= stopwait= runqsize= gfreecnt= throwing= spinning=atomicand8float64nanfloat32nanException ptrSize= targetpc= until pc=unknown pcruntime: ggoroutine 1220703125$mspan.sweep: bad span state after sweepruntime: blocked write on free polldescPowerRegisterSuspendResumeNotification$mspan.sweep: bad span stateinvalid profile bucket typeruntime: corrupted polldescruntime: netpollinit failedruntime: asyncPreemptStack=runtime: thread ID overflowstopTheWorld: holding locksgcstopm: not waiting for gcinternal lockOSThread errorruntime: checkdea$mspan.sweep: m is not lockedfound pointer to free objectmheap.freeSpanLocked - span runtime.semasleep unexpectedfatal: morestack on gsignalruntime: casgstatus: oldval=gcstopm: negative nmspinningfindrunnable: netpoll with psave on system g not allowednewproc1$sweep increased allocation countremovespecial on invalid pointerruntime: root level max pages = WSAGetOverlappedResult not found_cgo_pthread_key_created missingruntime: sudog with non-nil elemruntime: sudog with non-nil nextruntime: sudog with non-nil prevrunt$sweep: tried to preserve a user arena spanruntime: blocked write on closing polldescacquireSudog: found s.elem != nil in cachefatal error: cgo callback before cgo callon a locked thread with no template threadunexpected signal during runtime executionattempte$swept cached spanmarkBits overflowruntime: summary[runtime: level = , p.searchAddr = RtlGetCurrentPeb
                • API String ID: 0-3213733108
                • Opcode ID: fc9b28d460c29270dc791f935c9c1338cf548036df147925c92d5210018d930a
                • Instruction ID: 9d7693bc494b07011b1826cd6b54082dba85ef632a1d8ddd3fd30fd6902f62d6
                • Opcode Fuzzy Hash: fc9b28d460c29270dc791f935c9c1338cf548036df147925c92d5210018d930a
                • Instruction Fuzzy Hash: C382BE73208BC58ADB60CF65E4407AEBBA1F389B84F44951AEACD03B59DF38C595CB10
                Strings
                • sp= sp: lr: fp= gp= mp=) m=3125quitbitsNameTypeermssse3avx2bmi1bmi2false<nil>Errorfileshttpsimap2imap3imapspop3shostswriteclosechdirLstatMarchApril+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930Localint16int32int64uint8arrayslice and defersweeptestRtestWex, xrefs: 005FED92
                • ...finobjgc %: gp *(in n= ) - NaN P MPC= < end > ]:pc= G125625): TTLadxaesshaavxfmanet9889trueicmpigmpftpshttppop3smtp) = dialbindfile read on pipeunixopenStat.com.exe.bat.cmdpathJuneJulyEESTSASTAKSTAKDTACSTACDTAESTAEDTAWSTCESTNZSTNZDTboolint8uintcha, xrefs: 005FEBB7
                • pc=+Inf-Inf: p=cas1cas2cas3cas4cas5cas6 at m= sp= sp: lr: fp= gp= mp=) m=3125quitbitsNameTypeermssse3avx2bmi1bmi2false<nil>Errorfileshttpsimap2imap3imapspop3shostswriteclosechdirLstatMarchApril+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930Localint16int3, xrefs: 005FEDB2
                • fp= gp= mp=) m=3125quitbitsNameTypeermssse3avx2bmi1bmi2false<nil>Errorfileshttpsimap2imap3imapspop3shostswriteclosechdirLstatMarchApril+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930Localint16int32int64uint8arrayslice and defersweeptestRtestWexecWexecRsche, xrefs: 005FED72
                • non-Go function at pc=4656612873077392578125IPv4 address too shortmultiple :: in addressargument list too longaddress already in usenetwork is unreachablecannot allocate memoryprotocol not availableprotocol not supportedremote address changedConvertSidToString, xrefs: 005FEEDB
                • ) @s Pn=][}]> +25])idLlLtLuMn"tcpEOF???nilcgodnsudpftpssh::1set\\?NUL:\/\\.\??MayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08IDT+12PKT+11KST+05JST+10-01-11-12-08-09+13CETBSTMSK-06+14 m=StdDltintm, xrefs: 005FEC0D
                • _, xrefs: 005FEFE5
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: fp= gp= mp=) m=3125quitbitsNameTypeermssse3avx2bmi1bmi2false<nil>Errorfileshttpsimap2imap3imapspop3shostswriteclosechdirLstatMarchApril+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930Localint16int32int64uint8arrayslice and defersweeptestRtestWexecWexecRsche$ pc=+Inf-Inf: p=cas1cas2cas3cas4cas5cas6 at m= sp= sp: lr: fp= gp= mp=) m=3125quitbitsNameTypeermssse3avx2bmi1bmi2false<nil>Errorfileshttpsimap2imap3imapspop3shostswriteclosechdirLstatMarchApril+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930Localint16int3$ sp= sp: lr: fp= gp= mp=) m=3125quitbitsNameTypeermssse3avx2bmi1bmi2false<nil>Errorfileshttpsimap2imap3imapspop3shostswriteclosechdirLstatMarchApril+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930Localint16int32int64uint8arrayslice and defersweeptestRtestWex$) @s Pn=][}]> +25])idLlLtLuMn"tcpEOF???nilcgodnsudpftpssh::1set\\?NUL:\/\\.\??MayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08IDT+12PKT+11KST+05JST+10-01-11-12-08-09+13CETBSTMSK-06+14 m=StdDltintm$...finobjgc %: gp *(in n= ) - NaN P MPC= < end > ]:pc= G125625): TTLadxaesshaavxfmanet9889trueicmpigmpftpshttppop3smtp) = dialbindfile read on pipeunixopenStat.com.exe.bat.cmdpathJuneJulyEESTSASTAKSTAKDTACSTACDTAESTAEDTAWSTCESTNZSTNZDTboolint8uintcha$non-Go function at pc=4656612873077392578125IPv4 address too shortmultiple :: in addressargument list too longaddress already in usenetwork is unreachablecannot allocate memoryprotocol not availableprotocol not supportedremote address changedConvertSidToString$_
                • API String ID: 0-216964647
                • Opcode ID: 3a52f31b419d05c4fcbed58cec41ee8aceb811115d911a9d2296036e52aeb09d
                • Instruction ID: 97db0dd0051237ac3c49db1ed6d8878ad9ba4e36806360052e47b19c2c9456ac
                • Opcode Fuzzy Hash: 3a52f31b419d05c4fcbed58cec41ee8aceb811115d911a9d2296036e52aeb09d
                • Instruction Fuzzy Hash: B5223636209BC986DA709B25E4893AFBB65F789B80F045116EBCD43B6ACF3DC544CB00
                Strings
                • greyobject: obj not pointer-alignedmismatched begin/end of activeSweepmheap.freeSpanLocked - invalid freeattempt to clear non-empty span setruntime: close polldesc w/o unblockruntime: inconsistent read deadlinefindrunnable: netpoll with spinningpidleput: P has, xrefs: 005C16AF
                • marking free object KiB work (eager), [controller reset]mspan.sweep: state=sysMemStat overflowbad sequence numberntdll.dll not foundwinmm.dll not foundruntime: g0 stack [panic during mallocpanic holding locksmissing deferreturnunexpected gp.parampanic during , xrefs: 005C169E
                • base of <==GOGC] = pc=+Inf-Inf: p=cas1cas2cas3cas4cas5cas6 at m= sp= sp: lr: fp= gp= mp=) m=3125quitbitsNameTypeermssse3avx2bmi1bmi2false<nil>Errorfileshttpsimap2imap3imapspop3shostswriteclosechdirLstatMarchApril+0530+0430+0545+0630+0330+0845+1030+1245+134, xrefs: 005C165B
                • objgc %: gp *(in n= ) - NaN P MPC= < end > ]:pc= G125625): TTLadxaesshaavxfmanet9889trueicmpigmpftpshttppop3smtp) = dialbindfile read on pipeunixopenStat.com.exe.bat.cmdpathJuneJulyEESTSASTAKSTAKDTACSTACDTAESTAEDTAWSTCESTNZSTNZDTboolint8uintchanfuncc, xrefs: 005C1676
                • ) @s Pn=][}]> +25])idLlLtLuMn"tcpEOF???nilcgodnsudpftpssh::1set\\?NUL:\/\\.\??MayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08IDT+12PKT+11KST+05JST+10-01-11-12-08-09+13CETBSTMSK-06+14 m=StdDltintm, xrefs: 005C1645
                • runtime: marking free object addspecial on invalid pointerruntime: summary max pages = runtime: levelShift[level] = doRecordGoroutineProfile gp1=timeBegin/EndPeriod not foundruntime: sudog with non-nil cgfput: bad status (not Gdead)LockOSThread nesting overflo, xrefs: 005C15E7
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: ) @s Pn=][}]> +25])idLlLtLuMn"tcpEOF???nilcgodnsudpftpssh::1set\\?NUL:\/\\.\??MayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08IDT+12PKT+11KST+05JST+10-01-11-12-08-09+13CETBSTMSK-06+14 m=StdDltintm$base of <==GOGC] = pc=+Inf-Inf: p=cas1cas2cas3cas4cas5cas6 at m= sp= sp: lr: fp= gp= mp=) m=3125quitbitsNameTypeermssse3avx2bmi1bmi2false<nil>Errorfileshttpsimap2imap3imapspop3shostswriteclosechdirLstatMarchApril+0530+0430+0545+0630+0330+0845+1030+1245+134$greyobject: obj not pointer-alignedmismatched begin/end of activeSweepmheap.freeSpanLocked - invalid freeattempt to clear non-empty span setruntime: close polldesc w/o unblockruntime: inconsistent read deadlinefindrunnable: netpoll with spinningpidleput: P has$marking free object KiB work (eager), [controller reset]mspan.sweep: state=sysMemStat overflowbad sequence numberntdll.dll not foundwinmm.dll not foundruntime: g0 stack [panic during mallocpanic holding locksmissing deferreturnunexpected gp.parampanic during $objgc %: gp *(in n= ) - NaN P MPC= < end > ]:pc= G125625): TTLadxaesshaavxfmanet9889trueicmpigmpftpshttppop3smtp) = dialbindfile read on pipeunixopenStat.com.exe.bat.cmdpathJuneJulyEESTSASTAKSTAKDTACSTACDTAESTAEDTAWSTCESTNZSTNZDTboolint8uintchanfuncc$runtime: marking free object addspecial on invalid pointerruntime: summary max pages = runtime: levelShift[level] = doRecordGoroutineProfile gp1=timeBegin/EndPeriod not foundruntime: sudog with non-nil cgfput: bad status (not Gdead)LockOSThread nesting overflo
                • API String ID: 0-2832768888
                • Opcode ID: 169de8a3bab8cce5d1ba203b8d2577037a4726d31b8877cf2e6c9ff4dc77fe63
                • Instruction ID: 5ee0288ace95b13de6d0f626bdedb05aeb63fcee26107359b433b3acd48e4df2
                • Opcode Fuzzy Hash: 169de8a3bab8cce5d1ba203b8d2577037a4726d31b8877cf2e6c9ff4dc77fe63
                • Instruction Fuzzy Hash: DF61E372604B84CAEB109F55E44176EBB75F786BC0F44512AEF8D07B66CB38C1A4C744
                Strings
                • findrunnable: wrong ppreempt at unknown pcreleasep: invalid argcheckdead: runnable gruntime: newstack at runtime: newstack sp=runtime: confused by pcHeader.textStart= timer data corruption186264514923095703125931322574615478515625bad type in compare: IPv4 add, xrefs: 005E1F2E
                • findrunnable: netpoll with psave on system g not allowednewproc1: newg missing stacknewproc1: new g is not GdeadFixedStack is not power-of-2missing stack in shrinkstack args stack map entries for invalid runtime symbol tableruntime: no module data for traceReg, xrefs: 005E1F0C
                • global runq empty with non-zero runqsizemust be able to track idle limiter eventruntime: SyscallN has too many arguments13877787807814456755295395851135253906256938893903907228377647697925567626953125ryuFtoaFixed32 called with negative precaddress family not s, xrefs: 005E1EEA
                • findrunnable: negative nmspinningfreeing stack not in a stack spanstackalloc not on scheduler stackruntime: goroutine stack exceeds runtime: text offset out of rangetimer period must be non-negativeruntime: name offset out of rangeruntime: type offset out of r, xrefs: 005E1F1D
                • findrunnable: netpoll with spinningpidleput: P has non-empty run queuetraceback did not unwind completelyruntime: createevent failed; errno=1776356839400250464677810668945312588817841970012523233890533447265625ryuFtoaFixed32 called with prec > 9network dropped, xrefs: 005E1EFB
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: findrunnable: negative nmspinningfreeing stack not in a stack spanstackalloc not on scheduler stackruntime: goroutine stack exceeds runtime: text offset out of rangetimer period must be non-negativeruntime: name offset out of rangeruntime: type offset out of r$findrunnable: netpoll with psave on system g not allowednewproc1: newg missing stacknewproc1: new g is not GdeadFixedStack is not power-of-2missing stack in shrinkstack args stack map entries for invalid runtime symbol tableruntime: no module data for traceReg$findrunnable: netpoll with spinningpidleput: P has non-empty run queuetraceback did not unwind completelyruntime: createevent failed; errno=1776356839400250464677810668945312588817841970012523233890533447265625ryuFtoaFixed32 called with prec > 9network dropped$findrunnable: wrong ppreempt at unknown pcreleasep: invalid argcheckdead: runnable gruntime: newstack at runtime: newstack sp=runtime: confused by pcHeader.textStart= timer data corruption186264514923095703125931322574615478515625bad type in compare: IPv4 add$global runq empty with non-zero runqsizemust be able to track idle limiter eventruntime: SyscallN has too many arguments13877787807814456755295395851135253906256938893903907228377647697925567626953125ryuFtoaFixed32 called with negative precaddress family not s
                • API String ID: 0-1046944959
                • Opcode ID: 1b87c957fa9582b5f32755e581043f118d9ea0730d4b843305c6a4d1050bd51a
                • Instruction ID: 01ea4d7334872f7c6f913a8eb96c7c265eafb09bde66a8b9986fd6412845f34c
                • Opcode Fuzzy Hash: 1b87c957fa9582b5f32755e581043f118d9ea0730d4b843305c6a4d1050bd51a
                • Instruction Fuzzy Hash: C1928E32609BC486DB298F16E4843EABB65F789B90F489126CACD47B58DF3DC885C744
                Strings
                • 6^, xrefs: 005BB2BC
                • flushGen MB goal, s.state = s.base()= heapGoal=GOMEMLIMIT KiB now, pages at sweepgen= sweepgen , bound = , limit = tracefree(tracegc()exitThreadBad varintGC forced runqueue= stopwait= runqsize= gfreecnt= throwing= spinning=atomicand8float64nanfloat32nan, xrefs: 005BB316
                • != sweepgen MB globals, work.nproc= work.nwait= nStackRoots= flushedWork double unlock s.spanclass= MB) workers=min too large-byte block (runtime: val=runtime: seq=fatal error: idlethreads= syscalltick=load64 failedxadd64 failedxchg64 failednil stackbase, xrefs: 005BB331
                • runtime: p ms clock, nBSSRoots=runtime: P exp.) for minTrigger=GOMEMLIMIT=bad m value, elemsize= freeindex= span.list=, npages = tracealloc( p->status= in status idleprocs= gcwaiting= schedtick= timerslen= mallocing=bad timedivfloat64nan1float64nan2float64, xrefs: 005BB2FB
                • p mcache not flushed markroot jobs donepacer: assist ratio=workbuf is not emptybad use of bucket.mpbad use of bucket.bpruntime: double waitws2_32.dll not foundpreempt off reason: forcegc: phase errorgopark: bad g statusgo of nil func valueselectgo: bad wakeup, xrefs: 005BB358
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: != sweepgen MB globals, work.nproc= work.nwait= nStackRoots= flushedWork double unlock s.spanclass= MB) workers=min too large-byte block (runtime: val=runtime: seq=fatal error: idlethreads= syscalltick=load64 failedxadd64 failedxchg64 failednil stackbase$ flushGen MB goal, s.state = s.base()= heapGoal=GOMEMLIMIT KiB now, pages at sweepgen= sweepgen , bound = , limit = tracefree(tracegc()exitThreadBad varintGC forced runqueue= stopwait= runqsize= gfreecnt= throwing= spinning=atomicand8float64nanfloat32nan$p mcache not flushed markroot jobs donepacer: assist ratio=workbuf is not emptybad use of bucket.mpbad use of bucket.bpruntime: double waitws2_32.dll not foundpreempt off reason: forcegc: phase errorgopark: bad g statusgo of nil func valueselectgo: bad wakeup$runtime: p ms clock, nBSSRoots=runtime: P exp.) for minTrigger=GOMEMLIMIT=bad m value, elemsize= freeindex= span.list=, npages = tracealloc( p->status= in status idleprocs= gcwaiting= schedtick= timerslen= mallocing=bad timedivfloat64nan1float64nan2float64$6^
                • API String ID: 0-3929360498
                • Opcode ID: e5fa76c1547a888af401498500241e1170e78b0aab5854c5b890f632d2d4fdf6
                • Instruction ID: 9fe309bf7f5f5a592d973effd1ca4bd7acbf07d2f0add3b6b19acd64200b05b5
                • Opcode Fuzzy Hash: e5fa76c1547a888af401498500241e1170e78b0aab5854c5b890f632d2d4fdf6
                • Instruction Fuzzy Hash: 09E1E336208B80C6EB54CF65E4843AFBB65F785B90F448226EA9D43BA5DF7CE484C741
                Strings
                • , gp->atomicstatus=marking free object KiB work (eager), [controller reset]mspan.sweep: state=sysMemStat overflowbad sequence numberntdll.dll not foundwinmm.dll not foundruntime: g0 stack [panic during mallocpanic holding locksmissing deferreturnunexpected gp, xrefs: 005DA150
                • runtime: gp: gp=runtime: getg: g=forEachP: not done in async preemptbad manualFreeListruntime: textAddr cleantimers: bad p frames elided..., locked to threadruntime.semacreateruntime.semawakeup298023223876953125unable to parse IPsegmentation faultoperatio, xrefs: 005DA11A
                • suspendG from non-preemptible goroutineruntime: casfrom_Gscanstatus failed gp=stack growth not allowed in system calltraceback: unexpected SPWRITE function 277555756156289135105907917022705078125IPv4 field must have at least one digittransport endpoint is alre, xrefs: 005DA20A
                • , goid= s=nil (scan MB in pacer: % CPU ( zombie, j0 = head = panic: nmsys= locks= dying= allocsGODEBUG m->g0= pad1= pad2= text= minpc= value= (scan)types : type 19531259765625::ffff:abortedCopySidWSARecvWSASendsignal nil keyanswersavx512fos/execruntime#, xrefs: 005DA135, 005DA1B7
                • invalid g statuscastogscanstatusbad g transitionschedule: in cgoreflect mismatch untyped locals missing stackmapbad symbol tablenon-Go function not in ranges:23841857910156250123456789ABCDEFinvalid exchangeno route to hostinvalid argumentmessage too longobje, xrefs: 005DA1F9
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: , goid= s=nil (scan MB in pacer: % CPU ( zombie, j0 = head = panic: nmsys= locks= dying= allocsGODEBUG m->g0= pad1= pad2= text= minpc= value= (scan)types : type 19531259765625::ffff:abortedCopySidWSARecvWSASendsignal nil keyanswersavx512fos/execruntime#$, gp->atomicstatus=marking free object KiB work (eager), [controller reset]mspan.sweep: state=sysMemStat overflowbad sequence numberntdll.dll not foundwinmm.dll not foundruntime: g0 stack [panic during mallocpanic holding locksmissing deferreturnunexpected gp$invalid g statuscastogscanstatusbad g transitionschedule: in cgoreflect mismatch untyped locals missing stackmapbad symbol tablenon-Go function not in ranges:23841857910156250123456789ABCDEFinvalid exchangeno route to hostinvalid argumentmessage too longobje$runtime: gp: gp=runtime: getg: g=forEachP: not done in async preemptbad manualFreeListruntime: textAddr cleantimers: bad p frames elided..., locked to threadruntime.semacreateruntime.semawakeup298023223876953125unable to parse IPsegmentation faultoperatio$suspendG from non-preemptible goroutineruntime: casfrom_Gscanstatus failed gp=stack growth not allowed in system calltraceback: unexpected SPWRITE function 277555756156289135105907917022705078125IPv4 field must have at least one digittransport endpoint is alre
                • API String ID: 0-3259957224
                • Opcode ID: 28c467d5747793a7c8f7b046c8c298681d421d2f2beaa017d97c51c98dcbc973
                • Instruction ID: 11119f000ef56259cc7cc42bd9a1f82bdeca9f3bddcd38efef0ace6a33ad0a7e
                • Opcode Fuzzy Hash: 28c467d5747793a7c8f7b046c8c298681d421d2f2beaa017d97c51c98dcbc973
                • Instruction Fuzzy Hash: B1D17076208B81C2D724DB69E08576ABF61F3CABD0F049167EE9D43B6ACB79C440CB51
                Strings
                • runtime: lfstack.push invalid packing: node=out of memory allocating heap arena metadata/cpu/classes/scavenge/background:cpu-secondsruntime: unexpected metric registration for gcmarknewobject called while doing checkmarkactive sweepers found at start of mark p, xrefs: 005AC365
                • packed=BAD RANK status unknown(trigger= npages= nalloc= nfreed=[signal newval= mcount= bytes, stack=[ minLC= maxpc= stack=[ minutes etypes 48828125no anodeCancelIoReadFileAcceptExWSAIoctlClassANYQuestionavx512bwavx512vlgo/typesnet/httpgo/buildx509sha1Micr, xrefs: 005AC3A5
                • -> node= ms cpu, (forced) wbuf1.n= wbuf2.n= s.limit= s.state= B work ( B exp.) marked unmarked in use), size = bad prune, tail = recover: not in [ctxt != 0, oldval=, newval= threads=: status= blocked= lockedg=atomicor8 runtime= m->curg=(unknown)tracebac, xrefs: 005AC3C5
                • cnt=gcing MB, got= ... max=scav ptr ] = (usageinit ms, fault tab= top=[...], fp:1562578125 (at ntohsClassGreeksse41sse42ssse3StringFormat[]bytestringnetdnsdomaingophertelnet.localreturnlisten.onionsocketexec: SundayMondayFridayAugustUTC-11UTC-02UTC-08UTC-, xrefs: 005AC385
                • lfstack.push span.limit= span.state=bad flushGen MB stacks, worker mode nDataRoots= nSpanRoots= wbuf1=<nil> wbuf2=<nil> gcscandone runtime: gp= found at *( s.elemsize= B (goal , cons/mark maxTrigger= pages/byte s.sweepgen= allocCount end tracegcProces, xrefs: 005AC3EF
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: -> node= ms cpu, (forced) wbuf1.n= wbuf2.n= s.limit= s.state= B work ( B exp.) marked unmarked in use), size = bad prune, tail = recover: not in [ctxt != 0, oldval=, newval= threads=: status= blocked= lockedg=atomicor8 runtime= m->curg=(unknown)tracebac$ cnt=gcing MB, got= ... max=scav ptr ] = (usageinit ms, fault tab= top=[...], fp:1562578125 (at ntohsClassGreeksse41sse42ssse3StringFormat[]bytestringnetdnsdomaingophertelnet.localreturnlisten.onionsocketexec: SundayMondayFridayAugustUTC-11UTC-02UTC-08UTC-$ packed=BAD RANK status unknown(trigger= npages= nalloc= nfreed=[signal newval= mcount= bytes, stack=[ minLC= maxpc= stack=[ minutes etypes 48828125no anodeCancelIoReadFileAcceptExWSAIoctlClassANYQuestionavx512bwavx512vlgo/typesnet/httpgo/buildx509sha1Micr$lfstack.push span.limit= span.state=bad flushGen MB stacks, worker mode nDataRoots= nSpanRoots= wbuf1=<nil> wbuf2=<nil> gcscandone runtime: gp= found at *( s.elemsize= B (goal , cons/mark maxTrigger= pages/byte s.sweepgen= allocCount end tracegcProces$runtime: lfstack.push invalid packing: node=out of memory allocating heap arena metadata/cpu/classes/scavenge/background:cpu-secondsruntime: unexpected metric registration for gcmarknewobject called while doing checkmarkactive sweepers found at start of mark p
                • API String ID: 0-1621370682
                • Opcode ID: c12e68af4669c7ebffe4d4da2f85d7cbb8219f4e62b23d3ca95c3471088a8ffe
                • Instruction ID: 148b21f8c5386ff1749d414211312e17d1e733e9afbe525a53e91f777d7d2d09
                • Opcode Fuzzy Hash: c12e68af4669c7ebffe4d4da2f85d7cbb8219f4e62b23d3ca95c3471088a8ffe
                • Instruction Fuzzy Hash: 46218D32215B49C6EB10EF54E88636EBF68F78AB80F488527EE9D07726DF38C5108710
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: 2-by$expa$nd 3$te k
                • API String ID: 0-3581043453
                • Opcode ID: d0a0678b136faf6cdae2b5bb443573c909990b14ac4f0b67f8b4f134291ae36c
                • Instruction ID: 47faa7e3a054f288c306b693d26b9baa0dc2c7f8025ad0cbc55bd63b5fa5df66
                • Opcode Fuzzy Hash: d0a0678b136faf6cdae2b5bb443573c909990b14ac4f0b67f8b4f134291ae36c
                • Instruction Fuzzy Hash: 70B1B066F25FD94AF323A63810036B7EB185FFB9C9A40E327FC9474A87D72095036254
                Strings
                • casgstatus: bad incoming valuesresetspinning: not a spinning mentersyscallblock inconsistent runtime: split stack overflow: ...additional frames elided...unsafe.String: len out of range11368683772161602973937988281255684341886080801486968994140625zone must be, xrefs: 005DDCCF
                • casgstatus: waiting for Gwaiting but is Grunnablenot enough significant bits after mult128bitPow10the :: must expand to at least one field of zerosinvalid or incomplete multibyte or wide charactergo package net: dynamic selection of DNS resolverruntime: unabl, xrefs: 005DDC3B
                • newval= mcount= bytes, stack=[ minLC= maxpc= stack=[ minutes etypes 48828125no anodeCancelIoReadFileAcceptExWSAIoctlClassANYQuestionavx512bwavx512vlgo/typesnet/httpgo/buildx509sha1MicrosoftNexus.lnkfiles,dnsdns,filesipv6-icmp_outboundlocalhostconnectexfork, xrefs: 005DDCA5
                • runtime: casgstatus: oldval=gcstopm: negative nmspinningfindrunnable: netpoll with psave on system g not allowednewproc1: newg missing stacknewproc1: new g is not GdeadFixedStack is not power-of-2missing stack in shrinkstack args stack map entries for invalid , xrefs: 005DDC87
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: newval= mcount= bytes, stack=[ minLC= maxpc= stack=[ minutes etypes 48828125no anodeCancelIoReadFileAcceptExWSAIoctlClassANYQuestionavx512bwavx512vlgo/typesnet/httpgo/buildx509sha1MicrosoftNexus.lnkfiles,dnsdns,filesipv6-icmp_outboundlocalhostconnectexfork$casgstatus: bad incoming valuesresetspinning: not a spinning mentersyscallblock inconsistent runtime: split stack overflow: ...additional frames elided...unsafe.String: len out of range11368683772161602973937988281255684341886080801486968994140625zone must be$casgstatus: waiting for Gwaiting but is Grunnablenot enough significant bits after mult128bitPow10the :: must expand to at least one field of zerosinvalid or incomplete multibyte or wide charactergo package net: dynamic selection of DNS resolverruntime: unabl$runtime: casgstatus: oldval=gcstopm: negative nmspinningfindrunnable: netpoll with psave on system g not allowednewproc1: newg missing stacknewproc1: new g is not GdeadFixedStack is not power-of-2missing stack in shrinkstack args stack map entries for invalid
                • API String ID: 0-2878020112
                • Opcode ID: 028728f7a26f0ea3b3a3c875e20e3282dfb8f792a5b2439a71c153bef8e108a8
                • Instruction ID: 8d42e3f684e036d2a642b02b34653f4a4d76d683b67e75b9c463781cb2849246
                • Opcode Fuzzy Hash: 028728f7a26f0ea3b3a3c875e20e3282dfb8f792a5b2439a71c153bef8e108a8
                • Instruction Fuzzy Hash: BDB1B136609A84C6DB24CB29E48536EBF71F38AB84F548627DE9C43765CF7AC446CB10
                Strings
                • runtime/internal/thread exhaustionlocked m0 woke upentersyscallblock spinningthreads=gp.waiting != nilunknown caller pcstack: frame={sp:runtime: nameOff runtime: typeOff runtime: textOff 1192092895507812559604644775390625permission deniedwrong medium typeno da, xrefs: 005DA6E5
                • reflect., xrefs: 005DA70C
                • bad restart PC-thread limitstopm spinning nmidlelocked= needspinning=randinit twicestore64 failedsemaRoot queuebad allocCountbad span statestack overflow untyped args out of range no module dataruntime: seq1=runtime: goid= in goroutine 1907348632812595367431, xrefs: 005DA7D3
                • runtime., xrefs: 005DA6B2
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: bad restart PC-thread limitstopm spinning nmidlelocked= needspinning=randinit twicestore64 failedsemaRoot queuebad allocCountbad span statestack overflow untyped args out of range no module dataruntime: seq1=runtime: goid= in goroutine 1907348632812595367431$reflect.$runtime.$runtime/internal/thread exhaustionlocked m0 woke upentersyscallblock spinningthreads=gp.waiting != nilunknown caller pcstack: frame={sp:runtime: nameOff runtime: typeOff runtime: textOff 1192092895507812559604644775390625permission deniedwrong medium typeno da
                • API String ID: 0-1367606710
                • Opcode ID: dfc87a162e84d94f0db691b4ef4fa13258996f395f33df3674a926c4cac493b1
                • Instruction ID: f1c7121f23a8a6d59889b514ba03e06bb6b1d31e8f9b3b38f88b55064b0b645e
                • Opcode Fuzzy Hash: dfc87a162e84d94f0db691b4ef4fa13258996f395f33df3674a926c4cac493b1
                • Instruction Fuzzy Hash: FF71AE72B05A4086DB24CB28E08037BBBA2F385B94F5C8527DB8E57B95DB78D891C701
                Strings
                • stopTheWorld: not stopped (stopwait != 0)34694469519536141888238489627838134765625strconv: illegal AppendInt/FormatInt basecolon must be followed by more charactersReceived Close Connection for Stream ID %dMapIter.Value called on exhausted iteratorpersistental, xrefs: 005DE540
                • stopTheWorld: not stopped (status != _Pgcstop)signal arrived during external code executioncompileCallback: float arguments not supportedruntime: name offset base pointer out of rangeruntime: type offset base pointer out of rangeruntime: text offset base poin, xrefs: 005DE5BB
                • stopTheWorld: holding locksgcstopm: not waiting for gcinternal lockOSThread errorruntime: checkdead: nmidle=runtime: checkdead: find g runlock of unlocked rwmutexsigsend: inconsistent statemakeslice: len out of rangemakeslice: cap out of rangegrowslice: len ou, xrefs: 005DE605
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: stopTheWorld: holding locksgcstopm: not waiting for gcinternal lockOSThread errorruntime: checkdead: nmidle=runtime: checkdead: find g runlock of unlocked rwmutexsigsend: inconsistent statemakeslice: len out of rangemakeslice: cap out of rangegrowslice: len ou$stopTheWorld: not stopped (status != _Pgcstop)signal arrived during external code executioncompileCallback: float arguments not supportedruntime: name offset base pointer out of rangeruntime: type offset base pointer out of rangeruntime: text offset base poin$stopTheWorld: not stopped (stopwait != 0)34694469519536141888238489627838134765625strconv: illegal AppendInt/FormatInt basecolon must be followed by more charactersReceived Close Connection for Stream ID %dMapIter.Value called on exhausted iteratorpersistental
                • API String ID: 0-1789155415
                • Opcode ID: 83652f1d0c461c345fbcbb648c88178eb4e52534f9284f6cbca18c896105b993
                • Instruction ID: cb068819f451cbc3a08c53dc1a2018c0ad0a577616cd2c08aa1c81a63e8b7ff1
                • Opcode Fuzzy Hash: 83652f1d0c461c345fbcbb648c88178eb4e52534f9284f6cbca18c896105b993
                • Instruction Fuzzy Hash: 3DA1C032609B80CADB24DF29E49536EBBA1F38AB84F588527DA8D47765DF3CD445CB00
                Strings
                • pacer: assist ratio=workbuf is not emptybad use of bucket.mpbad use of bucket.bpruntime: double waitws2_32.dll not foundpreempt off reason: forcegc: phase errorgopark: bad g statusgo of nil func valueselectgo: bad wakeupsemaRoot rotateRightreflect.makeFuncStub, xrefs: 005C1FE6
                • (scan MB in pacer: % CPU ( zombie, j0 = head = panic: nmsys= locks= dying= allocsGODEBUG m->g0= pad1= pad2= text= minpc= value= (scan)types : type 19531259765625::ffff:abortedCopySidWSARecvWSASendsignal nil keyanswersavx512fos/execruntime#internPrograms, xrefs: 005C2005
                • MB) workers=min too large-byte block (runtime: val=runtime: seq=fatal error: idlethreads= syscalltick=load64 failedxadd64 failedxchg64 failednil stackbase}sched={pc:, gp->status= pluginpath= runtime: pid=: unknown pc called from 3814697265625dalTLDpSugct?, xrefs: 005C2065
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: (scan MB in pacer: % CPU ( zombie, j0 = head = panic: nmsys= locks= dying= allocsGODEBUG m->g0= pad1= pad2= text= minpc= value= (scan)types : type 19531259765625::ffff:abortedCopySidWSARecvWSASendsignal nil keyanswersavx512fos/execruntime#internPrograms$ MB) workers=min too large-byte block (runtime: val=runtime: seq=fatal error: idlethreads= syscalltick=load64 failedxadd64 failedxchg64 failednil stackbase}sched={pc:, gp->status= pluginpath= runtime: pid=: unknown pc called from 3814697265625dalTLDpSugct?$pacer: assist ratio=workbuf is not emptybad use of bucket.mpbad use of bucket.bpruntime: double waitws2_32.dll not foundpreempt off reason: forcegc: phase errorgopark: bad g statusgo of nil func valueselectgo: bad wakeupsemaRoot rotateRightreflect.makeFuncStub
                • API String ID: 0-914753012
                • Opcode ID: 66b8b3959f4267df7245b3ae4ecb31e45d555940aeefe6f8c29f52540a9cfe73
                • Instruction ID: edcb4be74d62b7e51d7d4eb41b6b90e708c979bb3a68629e83eebf0334965bb1
                • Opcode Fuzzy Hash: 66b8b3959f4267df7245b3ae4ecb31e45d555940aeefe6f8c29f52540a9cfe73
                • Instruction Fuzzy Hash: 7171B532518F94C9D611EB65E44075ABB65FBDABC0F44832AFA8E27726CF38C491C750
                Strings
                • selectgo: bad wakeupsemaRoot rotateRightreflect.makeFuncStubdodeltimer0: wrong Ptrace: out of memorywirep: already in go37252902984619140625missing IPv6 addressunexpected characterinvalid request codebad font file formatis a named type filekey has been revoked, xrefs: 005EC67B
                • gp.waiting != nilunknown caller pcstack: frame={sp:runtime: nameOff runtime: typeOff runtime: textOff 1192092895507812559604644775390625permission deniedwrong medium typeno data availableexec format errorLookupAccountSidWDnsRecordListFreeGetCurrentProcessGetSh, xrefs: 005EC6A5
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: gp.waiting != nilunknown caller pcstack: frame={sp:runtime: nameOff runtime: typeOff runtime: textOff 1192092895507812559604644775390625permission deniedwrong medium typeno data availableexec format errorLookupAccountSidWDnsRecordListFreeGetCurrentProcessGetSh$selectgo: bad wakeupsemaRoot rotateRightreflect.makeFuncStubdodeltimer0: wrong Ptrace: out of memorywirep: already in go37252902984619140625missing IPv6 addressunexpected characterinvalid request codebad font file formatis a named type filekey has been revoked
                • API String ID: 0-2172786039
                • Opcode ID: 82d8114099e7681219d931c0c9918f472601328677874f588de47015f5ebb1ad
                • Instruction ID: 83b1abb068b1e95f11be9d015fe654b60fd1206e7240a95f82996fc0c96808a3
                • Opcode Fuzzy Hash: 82d8114099e7681219d931c0c9918f472601328677874f588de47015f5ebb1ad
                • Instruction Fuzzy Hash: 46B26632204BD4C2D768CF12E84479A7BA9F388BC0F669526EEE947795DF78C891C701
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: :]$ ;]
                • API String ID: 0-164001195
                • Opcode ID: f22ffb3edcf88d94b5c92bf437152494631c4e868432e05c5bda731c771b9052
                • Instruction ID: 632f9b27c7b59797906d4e160c3717b5574afb64d6497f90eb954e8548118f18
                • Opcode Fuzzy Hash: f22ffb3edcf88d94b5c92bf437152494631c4e868432e05c5bda731c771b9052
                • Instruction Fuzzy Hash: CDF16B32249F84C5DB68CB15E4403AFBBA6F385B90F598126DE8E43BA5DF78C485CB40
                Strings
                • 3`, xrefs: 005BB5B8
                • gcing MB, got= ... max=scav ptr ] = (usageinit ms, fault tab= top=[...], fp:1562578125 (at ntohsClassGreeksse41sse42ssse3StringFormat[]bytestringnetdnsdomaingophertelnet.localreturnlisten.onionsocketexec: SundayMondayFridayAugustUTC-11UTC-02UTC-08UTC-09UTC, xrefs: 005BB654
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: 3`$gcing MB, got= ... max=scav ptr ] = (usageinit ms, fault tab= top=[...], fp:1562578125 (at ntohsClassGreeksse41sse42ssse3StringFormat[]bytestringnetdnsdomaingophertelnet.localreturnlisten.onionsocketexec: SundayMondayFridayAugustUTC-11UTC-02UTC-08UTC-09UTC
                • API String ID: 0-1393020697
                • Opcode ID: 504df797b07dd68de8d5967b56ecb5bc1413217600db621647263bffca2eb3a6
                • Instruction ID: 09323a7e0443361fce9d6d328cf8d3d770ef5a6f4ee9834392168baf1b2e3aa2
                • Opcode Fuzzy Hash: 504df797b07dd68de8d5967b56ecb5bc1413217600db621647263bffca2eb3a6
                • Instruction Fuzzy Hash: 5081B032608B80C5EB40DF60E4853AB7B65F38AB90F518226EADD437A5DFBDD148C740
                Strings
                • runtime: inconsistent write deadlineUnable to determine system directoryruntime: VirtualQuery failed; errno=runtime: sudog with non-nil waitlinkruntime: mcall called on m->g0 stackstartm: P required for spinning=true) is not Grunnable or Gscanrunnableruntime:, xrefs: 005D3965
                • runtime: inconsistent read deadlinefindrunnable: netpoll with spinningpidleput: P has non-empty run queuetraceback did not unwind completelyruntime: createevent failed; errno=1776356839400250464677810668945312588817841970012523233890533447265625ryuFtoaFixed32 , xrefs: 005D39D5
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: runtime: inconsistent read deadlinefindrunnable: netpoll with spinningpidleput: P has non-empty run queuetraceback did not unwind completelyruntime: createevent failed; errno=1776356839400250464677810668945312588817841970012523233890533447265625ryuFtoaFixed32 $runtime: inconsistent write deadlineUnable to determine system directoryruntime: VirtualQuery failed; errno=runtime: sudog with non-nil waitlinkruntime: mcall called on m->g0 stackstartm: P required for spinning=true) is not Grunnable or Gscanrunnableruntime:
                • API String ID: 0-2613774394
                • Opcode ID: ad044a47095c5be9ce11d8bff49b11abc52a0a6a27b7fbca8d2c242813eb8d12
                • Instruction ID: 12bd37d33f164570280a69d2f86d30b610af3d316c431c47b66934320e2701dd
                • Opcode Fuzzy Hash: ad044a47095c5be9ce11d8bff49b11abc52a0a6a27b7fbca8d2c242813eb8d12
                • Instruction Fuzzy Hash: CD51C53320A75185CB34CF29E05133BAFA1F786BA0F08462BEA9D43795CFB8C6449752
                Strings
                • !"#$%%&&''((()))*++,,,,,------....//////0001123333333333444444444455666677777888888888889999999999::::::;;;;;;;;;;;;;;;;<<<<<<<<<<<<<<<<=====>>>>>>>>>>>??????????@@@@@@@@@@@@@@@@@@@@@@AAAAAAAAAAAAAAAAAAAAABBBBBBBBBBBCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC, xrefs: 005EF26D, 005EF376, 005EF4B7, 005EF5DF
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: !"#$%%&&''((()))*++,,,,,------....//////0001123333333333444444444455666677777888888888889999999999::::::;;;;;;;;;;;;;;;;<<<<<<<<<<<<<<<<=====>>>>>>>>>>>??????????@@@@@@@@@@@@@@@@@@@@@@AAAAAAAAAAAAAAAAAAAAABBBBBBBBBBBCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
                • API String ID: 0-2911004680
                • Opcode ID: 8e901955245da634a455f9623f9d2afbf07c9b57d8d78d8df2951f337370e866
                • Instruction ID: f1b64b471c9863d1f0202cc2c10570a08a64251958935e1cf6e9022fd28e2d89
                • Opcode Fuzzy Hash: 8e901955245da634a455f9623f9d2afbf07c9b57d8d78d8df2951f337370e866
                • Instruction Fuzzy Hash: ACF1E332754AC486DA18DF66E8003AABB56F785BD0F958436EA9E07BD5CF7CC841C305
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: 6^
                • API String ID: 0-3791550746
                • Opcode ID: 53a9257113997c3f60936aaa53e3822af6f57c3c82eeb3f9493033b9c7eb461b
                • Instruction ID: 7c134c1342c4c7450f3cf2a828cc80465aebe78b793ea7b5a38d6fcef6a7f5c6
                • Opcode Fuzzy Hash: 53a9257113997c3f60936aaa53e3822af6f57c3c82eeb3f9493033b9c7eb461b
                • Instruction Fuzzy Hash: 6CB1F172209B84C6DB15CF25E8443BABB66F386F94F188635DA9D13B94CF38E485C701
                Strings
                • runtime: cannot allocate memorycheckmark found unmarked objectruntime: failed to commit pages/memory/classes/heap/free:bytes/memory/classes/os-stacks:bytespacer: sweep done at heap size non in-use span in unswept listcasgstatus: bad incoming valuesresetspinnin, xrefs: 005D0065
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: runtime: cannot allocate memorycheckmark found unmarked objectruntime: failed to commit pages/memory/classes/heap/free:bytes/memory/classes/os-stacks:bytespacer: sweep done at heap size non in-use span in unswept listcasgstatus: bad incoming valuesresetspinnin
                • API String ID: 0-429552053
                • Opcode ID: 2c6375df0ee66950a860cd547d3998ad245f1038f6b47274a09716a6ccd86537
                • Instruction ID: a8b54ba6a60b9b99085b21da2f405cc2fa79287ab15d8a8fa3b208b1451e7d7f
                • Opcode Fuzzy Hash: 2c6375df0ee66950a860cd547d3998ad245f1038f6b47274a09716a6ccd86537
                • Instruction Fuzzy Hash: 32A17B76618B94C6CA20CB56E44076EAB76F3C9BC0F585526EF8D47B29CF38C991CB40
                Strings
                • bulkBarrierPreWrite: unaligned argumentsrefill of span with free space remaining/cpu/classes/scavenge/assist:cpu-secondsruntime.SetFinalizer: first argument is failed to acquire lock to reset capacitymarkWorkerStop: unknown mark worker modecannot free workbufs, xrefs: 005B5E87
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: bulkBarrierPreWrite: unaligned argumentsrefill of span with free space remaining/cpu/classes/scavenge/assist:cpu-secondsruntime.SetFinalizer: first argument is failed to acquire lock to reset capacitymarkWorkerStop: unknown mark worker modecannot free workbufs
                • API String ID: 0-866072839
                • Opcode ID: de4e0b2603993152ddd1a87c7ed5a7be8b35a723012637483fad0dbd82e13009
                • Instruction ID: 863c39902d3050577a8b40dc54bb3f55eb9892b6d37c790f91f345a0df9d8672
                • Opcode Fuzzy Hash: de4e0b2603993152ddd1a87c7ed5a7be8b35a723012637483fad0dbd82e13009
                • Instruction Fuzzy Hash: 0B91C0B6705F8482DB188F56E4443AAAB65F389FC0F589126EF8D57B18EF38D491CB00
                Strings
                • bad summary dataruntime: addr = runtime: base = runtime: head = timeBeginPeriod, xrefs: 005CF167
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: bad summary dataruntime: addr = runtime: base = runtime: head = timeBeginPeriod
                • API String ID: 0-2099802129
                • Opcode ID: 5481d54c0984da4ee0e4a5a67c4866ea971aebe08222671c724d88b22d23753c
                • Instruction ID: e7492d6646280c6f8ab7adc1db37c6fb732a9548878caaed4d107c29f327a19c
                • Opcode Fuzzy Hash: 5481d54c0984da4ee0e4a5a67c4866ea971aebe08222671c724d88b22d23753c
                • Instruction Fuzzy Hash: 3561DFB2750B8886DB009F95E44079A7B66F78ABD0F44923AEF9D13B96CB78C580C340
                Strings
                • 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899, xrefs: 0061CDBE
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
                • API String ID: 0-2272463933
                • Opcode ID: 544d34b7c7772609efa53e911e6bfb4dff0fc063ae73cc63aa8868b920208995
                • Instruction ID: 7c900add1dccbe4f45a66050f9283efc06df3035d09d148a7fd14ad2f511fc53
                • Opcode Fuzzy Hash: 544d34b7c7772609efa53e911e6bfb4dff0fc063ae73cc63aa8868b920208995
                • Instruction Fuzzy Hash: 98412A32BC465482CB188B59A4117ED6A17E795FF0F9D5269CE0E0BB91CA69CCC6C384
                Strings
                • gcmarknewobject called while doing checkmarkactive sweepers found at start of mark phaseno P available, write barriers are forbiddencompileCallback: float results not supportedcannot trace user goroutine on its own stackunsafe.Slice: ptr is nil and len is not , xrefs: 005C1C50
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID: gcmarknewobject called while doing checkmarkactive sweepers found at start of mark phaseno P available, write barriers are forbiddencompileCallback: float results not supportedcannot trace user goroutine on its own stackunsafe.Slice: ptr is nil and len is not
                • API String ID: 0-3110597650
                • Opcode ID: 95b138d9991054ec6f11f3c02461700914ddf8539f56229ea5deb5f8fc906794
                • Instruction ID: 445210fdbcc7e54dcb1bafcafab87d9b104f196c0f6d89ce7522ad8b217a345b
                • Opcode Fuzzy Hash: 95b138d9991054ec6f11f3c02461700914ddf8539f56229ea5deb5f8fc906794
                • Instruction Fuzzy Hash: 0F2103F3B42A8447EF048F15D4403A86B22F396FD8F49E076CF4957746CA68C592C300
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2a327071dd105c25a9b8cb1b119f2811a4fea4066297b46f23a5dcff6c0cd065
                • Instruction ID: 2dcdd6ec15d1e0499eab0f261794ba65e166347cb5902b17fb99c2182ef2dd29
                • Opcode Fuzzy Hash: 2a327071dd105c25a9b8cb1b119f2811a4fea4066297b46f23a5dcff6c0cd065
                • Instruction Fuzzy Hash: 2BC1F833B48A9482CA54CF1AE441BEEA762F385FE4F4C5411EE8D87B18CB79C995CB40
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: eda43599758b63797bb4e7e5665ead07e2a67daab0f8d07b557b33772c96f6a0
                • Instruction ID: 946d9f23bbdafe773f363232436adb5f2e597b2dafee5123ad504d140d8f073c
                • Opcode Fuzzy Hash: eda43599758b63797bb4e7e5665ead07e2a67daab0f8d07b557b33772c96f6a0
                • Instruction Fuzzy Hash: E591D3767196C186CB6CCB67A550B6ABB65F789BC0F489426EECD47F18CB3CC8508B40
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e66b3d7d87a7107ea2e7963f42bcf8cd2656701d6dcb2611a44547f06cec1e9a
                • Instruction ID: cb1c8c10ecbfcc7ca9d9a175bfac659d325be5bba6a4cc9a0a064e80908b852d
                • Opcode Fuzzy Hash: e66b3d7d87a7107ea2e7963f42bcf8cd2656701d6dcb2611a44547f06cec1e9a
                • Instruction Fuzzy Hash: A7B10D16D1CFCA50E61357789403B762B106FF39D4F01D73ABAC2F16A3DB566A00BA22
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 93777dd3814fc503c69b58b28e96303c24bab9db006b93a2883c99640e9c12de
                • Instruction ID: 7d719542a8bf19b9848f480844d19caf3beb4f6c261d2ff57a880be0755aef25
                • Opcode Fuzzy Hash: 93777dd3814fc503c69b58b28e96303c24bab9db006b93a2883c99640e9c12de
                • Instruction Fuzzy Hash: A6A14776618B8486DB10CB65E08075ABBA1F789BD4F14522AEFDE53BA9CF3CD051CB40
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 00fca6ffe96d0598eb837d865953b686d33a67bbe900ba1178b2787fa9c7e443
                • Instruction ID: 4f8655bf913d0abc42eabda5b97a4cf1de0057127b00231b96ba011517b637f8
                • Opcode Fuzzy Hash: 00fca6ffe96d0598eb837d865953b686d33a67bbe900ba1178b2787fa9c7e443
                • Instruction Fuzzy Hash: 9B81B477718B8486DB108F95E4807AABB72F79ABC0F08512AEF8D57B59CB78D481C740
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b15f9b251d4b9bad160ca198cc595e2c5b7e26107d4e1a8077fa7aa7865769d1
                • Instruction ID: 448a1c6d895670e806b0fd8c71262130fc10f4e18fb5325edd7288614ce0dda2
                • Opcode Fuzzy Hash: b15f9b251d4b9bad160ca198cc595e2c5b7e26107d4e1a8077fa7aa7865769d1
                • Instruction Fuzzy Hash: A841F5A5B01A9485AE048B6295240AEA761F74FFD0398E633DF1D77B6CD73CD906C348
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8f5544c23892530e6ff4a0e1e40e00622561a5280096765141d73e8fd0a37b3e
                • Instruction ID: bc480bab9adf13330a5b45a0481e57e498f954cc91cc8d5aeed091ba57407c5a
                • Opcode Fuzzy Hash: 8f5544c23892530e6ff4a0e1e40e00622561a5280096765141d73e8fd0a37b3e
                • Instruction Fuzzy Hash: 09413B22B81A4C8BEB009F3994523B65A85F380774FCC4675DFED473C2E2ADCAE59610
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f0a7a0baea95fd27db43dd60eeadacc24f31a1ad7dc38dabda4e2d949d588315
                • Instruction ID: 13700decb016cba4c4259387eae7e943365794cd852e5d37808270bb8301da98
                • Opcode Fuzzy Hash: f0a7a0baea95fd27db43dd60eeadacc24f31a1ad7dc38dabda4e2d949d588315
                • Instruction Fuzzy Hash: 4C51E67270DB498ADA05CB75E44472AA761F78EBE4F188729EA5D13B94EF3CD4C18B00
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 78ed0ed9ca0cdd05faed2fded70e7b31717ee3d05d4e96dc5803aa543740dc3c
                • Instruction ID: aebd06353482dbea93a4318384bf7e1deefea31f51b6b3b8326aaaf14de0a087
                • Opcode Fuzzy Hash: 78ed0ed9ca0cdd05faed2fded70e7b31717ee3d05d4e96dc5803aa543740dc3c
                • Instruction Fuzzy Hash: 2B3108E2A0BE494DDE0BD7BA54617209657BFD3FE0F94D722582B762E4EF1983428700
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d559122a1f6f0b69832be9421c7c214fb777efde5fa0d191de61b1ee1601c01b
                • Instruction ID: 87b37552f95af525a587bcc17d09d50b04beae85753f244dbf75b262db5a2840
                • Opcode Fuzzy Hash: d559122a1f6f0b69832be9421c7c214fb777efde5fa0d191de61b1ee1601c01b
                • Instruction Fuzzy Hash: 543127B6715B8446EF98CB225A243C9639BF798BC4F05E5769F4C93318EB38E590C340
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2038f05e97998120fb53114f31a9548b5147d81bdcd68613d0732e6f28c08c9d
                • Instruction ID: e94f23759229c90b5217f41c3c1165a623fbe57bd4cce06f0991e67cd48cb19d
                • Opcode Fuzzy Hash: 2038f05e97998120fb53114f31a9548b5147d81bdcd68613d0732e6f28c08c9d
                • Instruction Fuzzy Hash: 131100E2E36F440ADA47C73A5551315820B6F97BD0F28D322BD1BB6796E72991D38100
                Memory Dump Source
                • Source File: 00000000.00000002.2673591282.00000000005A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                • Associated: 00000000.00000002.2673550473.00000000005A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673667064.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673750056.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673766899.00000000007A2000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673787166.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673807813.00000000007AD000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673825938.0000000000835000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.0000000000839000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673896976.000000000087F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2673990265.0000000000920000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2674006023.0000000000921000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5a0000_5yv6ZxNaTP.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a256208f17b381db6722f0ed2d02a2297ad36eb4d6491dea5391dd1c04bdc341
                • Instruction ID: 8c62e02cbf8056ce11925d65995b39dd87271b69d6bd4748572d2358765d0429
                • Opcode Fuzzy Hash: a256208f17b381db6722f0ed2d02a2297ad36eb4d6491dea5391dd1c04bdc341
                • Instruction Fuzzy Hash: CBC02BF0907FC128FB94C34071003533AC7CF443C4D80C090C2D800764DA2CC3824204
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1466363103.00007FFB4B440000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B440000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_7ffb4b440000_powershell.jbxd
                Similarity
                • API ID:
                • String ID: 2B_H
                • API String ID: 0-1297890977
                • Opcode ID: 484f1cf8013076a2da54927c8fae3de87b057708090b89dfecf4c8570cc7ec39
                • Instruction ID: 652729987e377438af7008d1d7c6a50156d3dcaa8e714347dc8d8868d4267bb1
                • Opcode Fuzzy Hash: 484f1cf8013076a2da54927c8fae3de87b057708090b89dfecf4c8570cc7ec39
                • Instruction Fuzzy Hash: F37237A2A0DAD90FE79AAB7888651747FD1EF56310F0840FED58CC72D3DD18AC568392
                Memory Dump Source
                • Source File: 00000001.00000002.1466363103.00007FFB4B440000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B440000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_7ffb4b440000_powershell.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5aa72af80c92c063d7487e535b377058d95390f0b6227125cc4d3428e8d32f06
                • Instruction ID: bbe5fd27a463e6f6ef496ca9e83b979f9790eddabf36a3e16182b6006d758b8f
                • Opcode Fuzzy Hash: 5aa72af80c92c063d7487e535b377058d95390f0b6227125cc4d3428e8d32f06
                • Instruction Fuzzy Hash: 0551067180D7D84FD35A9B28D8556A47FF0EF97320F0942EFE089C71A3D668A826C752
                Memory Dump Source
                • Source File: 00000001.00000002.1465988468.00007FFB4B370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B370000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_7ffb4b370000_powershell.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                • Instruction ID: 5fa3338294c3b4baabbcae15557c230475371c44801a5eeae78c5c4df2a1f4bb
                • Opcode Fuzzy Hash: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                • Instruction Fuzzy Hash: 8901677111CB0C8FD744EF0CE451AA5B7E0FB95364F10056DE58AC36A1DA36E882CB45