Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
wr.exe

Overview

General Information

Sample name:wr.exe
Analysis ID:1428863
MD5:e2a072228078e6f3cf5073f4af029913
SHA1:16ed4faf2239de52acdc439e88047984b8510547
SHA256:a742c71ce1ae3316e82d2b8c788b9c6ffd723d8d6da4f94ba5639b84070bb639
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Potentially malicious time measurement code found
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Detected potential crypto function
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
PE / OLE file has an invalid certificate
PE file contains sections with non-standard names

Classification

  • System is w10x64
  • wr.exe (PID: 5064 cmdline: "C:\Users\user\Desktop\wr.exe" MD5: E2A072228078E6F3CF5073F4AF029913)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: wr.exeAvira: detected
Source: wr.exeReversingLabs: Detection: 87%
Source: wr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\wr.exeCode function: 4x nop then mov rsi, r90_2_005DB2A0
Source: C:\Users\user\Desktop\wr.exeCode function: 4x nop then mov rdi, 0000800000000000h0_2_005D9DE0
Source: unknownDNS traffic detected: queries for: www.dblikes.top
Source: wr.exe, wr.exe, 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.dblikes.top/winconsistent
Source: wr.exeString found in binary or memory: https://www.sysinternals.com0
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_00617300 SetWaitableTimer,SetWaitableTimer,NtWaitForSingleObject,0_2_00617300
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_006172C0 NtWaitForSingleObject,0_2_006172C0
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005E40800_2_005E4080
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005B61600_2_005B6160
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005D41E00_2_005D41E0
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_006052400_2_00605240
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005DA2600_2_005DA260
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_006282200_2_00628220
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005D72C00_2_005D72C0
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_0060F2A00_2_0060F2A0
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005C92800_2_005C9280
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005DB2A00_2_005DB2A0
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005F73000_2_005F7300
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005FF3E00_2_005FF3E0
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005CD3800_2_005CD380
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_006264400_2_00626440
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005ED4600_2_005ED460
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_006124A90_2_006124A9
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005BC4A00_2_005BC4A0
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005F04A00_2_005F04A0
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005E75000_2_005E7500
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005DC5A00_2_005DC5A0
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005FA6600_2_005FA660
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005C56000_2_005C5600
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005D66000_2_005D6600
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005B66200_2_005B6620
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005D17400_2_005D1740
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005C48600_2_005C4860
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005C98E00_2_005C98E0
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005B58800_2_005B5880
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005FDAA00_2_005FDAA0
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005EEBC00_2_005EEBC0
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005BDBA00_2_005BDBA0
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_00625C000_2_00625C00
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005F3C200_2_005F3C20
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_00627CE00_2_00627CE0
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005C9CC00_2_005C9CC0
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_00606C800_2_00606C80
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005E7D600_2_005E7D60
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005D9DE00_2_005D9DE0
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005B9E200_2_005B9E20
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005EAE200_2_005EAE20
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005EDEA00_2_005EDEA0
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005CFF600_2_005CFF60
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005BCFE00_2_005BCFE0
Source: C:\Users\user\Desktop\wr.exeCode function: String function: 005FE620 appears 37 times
Source: C:\Users\user\Desktop\wr.exeCode function: String function: 005E8320 appears 54 times
Source: C:\Users\user\Desktop\wr.exeCode function: String function: 005E6A60 appears 31 times
Source: C:\Users\user\Desktop\wr.exeCode function: String function: 005E6960 appears 564 times
Source: C:\Users\user\Desktop\wr.exeCode function: String function: 005E8BA0 appears 563 times
Source: wr.exeStatic PE information: invalid certificate
Source: classification engineClassification label: mal60.evad.winEXE@1/0@2/0
Source: C:\Users\user\Desktop\wr.exeMutant created: \Sessions\1\BaseNamedObjects\abc20259991
Source: C:\Users\user\Desktop\wr.exeFile opened: C:\Windows\system32\86dbeb1e3f4e7a98ad6a93ba86f929747d19ef3c7cdf7a0145acd6db2fd830a1AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJump to behavior
Source: C:\Users\user\Desktop\wr.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: wr.exeReversingLabs: Detection: 87%
Source: wr.exeString found in binary or memory: C:/Program Files/Go/src/net/addrselect.go
Source: wr.exeString found in binary or memory: C:/Users/Sroc/go/pkg/mod/golang.org/x/sys@v0.17.0/windows/svc/eventlog/install.go
Source: C:\Users\user\Desktop\wr.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\wr.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\wr.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\wr.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\wr.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\wr.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\wr.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\wr.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\wr.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\wr.exeSection loaded: mswsock.dllJump to behavior
Source: wr.exeStatic file information: File size 4445584 > 1048576
Source: wr.exeStatic PE information: Raw size of UPX1 is bigger than: 0x100000 < 0x43aa00
Source: wr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_00D9A7C0 LoadLibraryA,GetProcAddress,ExitProcess,VirtualProtect,VirtualProtect,VirtualProtect,ExitProcess,0_2_00D9A7C0
Source: wr.exeStatic PE information: section name: UPX2
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: C:\Users\user\Desktop\wr.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\wr.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_006153E0 rdtscp0_2_006153E0
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005E19C0 GetProcessAffinityMask,GetSystemInfo,0_2_005E19C0
Source: wr.exe, 00000000.00000002.2039272794.000002685E15C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\wr.exeAPI call chain: ExitProcess graph end nodegraph_0-45125
Source: C:\Users\user\Desktop\wr.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_006153E0 Start: 006153E9 End: 006153FF0_2_006153E0
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_006153E0 rdtscp0_2_006153E0
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_00D9A7C0 LoadLibraryA,GetProcAddress,ExitProcess,VirtualProtect,VirtualProtect,VirtualProtect,ExitProcess,0_2_00D9A7C0
Source: C:\Users\user\Desktop\wr.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\wr.exeCode function: 0_2_005F9980 RtlAddVectoredExceptionHandler,RtlAddVectoredContinueHandler,RtlAddVectoredContinueHandler,SetUnhandledExceptionFilter,0_2_005F9980
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
Software Packing
OS Credential Dumping11
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Deobfuscate/Decode Files or Information
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager2
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook21
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
wr.exe88%ReversingLabsWin64.Trojan.DisguisedXMRigMiner
wr.exe100%AviraTR/Redcap.rhlwi
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
ghs.googlehosted.com
173.194.209.121
truefalse
    unknown
    www.dblikes.top
    unknown
    unknownfalse
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://www.dblikes.top/winconsistentwr.exe, wr.exe, 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmpfalse
        unknown
        https://www.sysinternals.com0wr.exefalse
          unknown
          No contacted IP infos
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1428863
          Start date and time:2024-04-19 18:35:15 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 3m 2s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:2
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:wr.exe
          Detection:MAL
          Classification:mal60.evad.winEXE@1/0@2/0
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 3
          • Number of non-executed functions: 47
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Stop behavior analysis, all processes terminated
          • Exclude process from analysis (whitelisted): dllhost.exe
          • VT rate limit hit for: wr.exe
          No simulations
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          ghs.googlehosted.comphishing_email.eml.msgGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
          • 142.250.190.19
          rsV7dDNYT3.elfGet hashmaliciousUnknownBrowse
          • 142.250.80.51
          sample.binGet hashmaliciousUnknownBrowse
          • 142.251.116.121
          SecuriteInfo.com.Application.Linux.Generic.22204.666.18925.elfGet hashmaliciousUnknownBrowse
          • 172.217.13.115
          https://courtofkingsbenchofalberta.securevdr.com/public/share/web-b2e071badfaa4de2Get hashmaliciousHTMLPhisherBrowse
          • 142.251.40.115
          https://cthompson-vsc16.coupacloud.com/quotes/external_responses/b30e6941a7e0553e0d3b5d318c8a406aefe85fa0bd4d5e844560a248434cc9ccd28fbee0140d9980/terms?response_intend=trueGet hashmaliciousUnknownBrowse
          • 142.251.32.115
          https://cthompson-vsc16.coupacloud.com/quotes/external_responses/b30e6941a7e0553e0d3b5d318c8a406aefe85fa0bd4d5e844560a248434cc9ccd28fbee0140d9980/terms?response_intend=trueGet hashmaliciousUnknownBrowse
          • 142.251.32.115
          https://www.sharevault.net/panajax/index.jsp?et=iaebe&uno=d53d1e12-04bb-4756-9e67-8d688dccc59d&svid=6876Get hashmaliciousUnknownBrowse
          • 142.250.80.115
          https://c4acd020.caspio.com/dp/74bad000cb53f19fe49e4479a674Get hashmaliciousUnknownBrowse
          • 142.251.2.121
          No context
          No context
          No context
          No created / dropped files found
          File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
          Entropy (8bit):7.891548043841517
          TrID:
          • Win64 Executable (generic) (12005/4) 74.95%
          • Generic Win/DOS Executable (2004/3) 12.51%
          • DOS Executable Generic (2002/1) 12.50%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
          File name:wr.exe
          File size:4'445'584 bytes
          MD5:e2a072228078e6f3cf5073f4af029913
          SHA1:16ed4faf2239de52acdc439e88047984b8510547
          SHA256:a742c71ce1ae3316e82d2b8c788b9c6ffd723d8d6da4f94ba5639b84070bb639
          SHA512:1ff79ce5e138afe9924577d4901ac028a7a2ba90b2273779b4a933aa65a6963d1c23a5b35e6015eb96f8b3efdc1766b7a2b5e18cc7bd181dc82660c9ef34fa6e
          SSDEEP:98304:DdTDuHIp8vWucCSSR94RD2rwCL2ZtIjcQyWYkgiDyYNWGtlNRtkG2wpOx1DkkSgB:dDbTJGi2rAZUghYPtXR6GhI9R0n0
          TLSH:3626335A2501A1A4E1E57B7032AD3DD2E88F34434FAE74A54C8BCAF01D7AED39B53063
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.........r.<.....".......C.......:.P.~...;...@...............................~...........`... ............................
          Icon Hash:00928e8e8686b000
          Entrypoint:0xbea750
          Entrypoint Section:UPX1
          Digitally signed:true
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:6
          OS Version Minor:1
          File Version Major:6
          File Version Minor:1
          Subsystem Version Major:6
          Subsystem Version Minor:1
          Import Hash:6ed4f5f04d62b18d96b26d6db7c18840
          Signature Valid:false
          Signature Issuer:CN=Microsoft Code Signing PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
          Signature Validation Error:The digital signature of the object did not verify
          Error Number:-2146869232
          Not Before, Not After
          • 02/09/2021 20:32:59 01/09/2022 20:32:59
          Subject Chain
          • CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
          Version:3
          Thumbprint MD5:D15B2B9631F8B37BA8D83A5AE528A8BB
          Thumbprint SHA-1:8740DF4ACB749640AD318E4BE842F72EC651AD80
          Thumbprint SHA-256:2EB421FBB33BBF9C8F6B58C754B0405F40E02CB6328936AAE39DB7A24880EA21
          Serial:33000002528B33AAF895F339DB000000000252
          Instruction
          push ebx
          push esi
          push edi
          push ebp
          dec eax
          lea esi, dword ptr [FFBC58CAh]
          dec eax
          lea edi, dword ptr [esi-003AF025h]
          push edi
          xor ebx, ebx
          xor ecx, ecx
          dec eax
          or ebp, FFFFFFFFh
          call 00007F90F4F1FE85h
          add ebx, ebx
          je 00007F90F4F1FE34h
          rep ret
          mov ebx, dword ptr [esi]
          dec eax
          sub esi, FFFFFFFCh
          adc ebx, ebx
          mov dl, byte ptr [esi]
          rep ret
          dec eax
          lea eax, dword ptr [edi+ebp]
          cmp ecx, 05h
          mov dl, byte ptr [eax]
          jbe 00007F90F4F1FE53h
          dec eax
          cmp ebp, FFFFFFFCh
          jnbe 00007F90F4F1FE4Dh
          sub ecx, 04h
          mov edx, dword ptr [eax]
          dec eax
          add eax, 04h
          sub ecx, 04h
          mov dword ptr [edi], edx
          dec eax
          lea edi, dword ptr [edi+04h]
          jnc 00007F90F4F1FE21h
          add ecx, 04h
          mov dl, byte ptr [eax]
          je 00007F90F4F1FE42h
          dec eax
          inc eax
          mov byte ptr [edi], dl
          sub ecx, 01h
          mov dl, byte ptr [eax]
          dec eax
          lea edi, dword ptr [edi+01h]
          jne 00007F90F4F1FE22h
          rep ret
          cld
          inc ecx
          pop ebx
          jmp 00007F90F4F1FE3Ah
          dec eax
          inc esi
          mov byte ptr [edi], dl
          dec eax
          inc edi
          mov dl, byte ptr [esi]
          add ebx, ebx
          jne 00007F90F4F1FE3Ch
          mov ebx, dword ptr [esi]
          dec eax
          sub esi, FFFFFFFCh
          adc ebx, ebx
          mov dl, byte ptr [esi]
          jc 00007F90F4F1FE18h
          lea eax, dword ptr [ecx+01h]
          jmp 00007F90F4F1FE39h
          dec eax
          inc ecx
          call ebx
          adc eax, eax
          inc ecx
          call ebx
          adc eax, eax
          add ebx, ebx
          jne 00007F90F4F1FE3Ch
          mov ebx, dword ptr [esi]
          dec eax
          sub esi, FFFFFFFCh
          adc ebx, ebx
          mov dl, byte ptr [esi]
          jnc 00007F90F4F1FE16h
          sub eax, 03h
          jc 00007F90F4F1FE4Bh
          shl eax, 08h
          movzx edx, dl
          or eax, edx
          dec eax
          inc esi
          xor eax, FFFFFFFFh
          je 00007F90F4F1FE8Ah
          sar eax, 1
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x7eb0000x9cUPX2
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x43ae000x2790UPX1
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          UPX00x10000x3af0000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          UPX10x3b00000x43b0000x43aa0049b53f25b9a2d71ae3dc7f43479caa91unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          UPX20x7eb0000x10000x2002a6c937fc0cf9a0e86bf0698c0a6a7dbFalse0.1953125data1.3719135890817398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          DLLImport
          KERNEL32.DLLLoadLibraryA, ExitProcess, GetProcAddress, VirtualProtect
          TimestampSource PortDest PortSource IPDest IP
          Apr 19, 2024 18:36:06.205009937 CEST6535753192.168.2.58.8.8.8
          Apr 19, 2024 18:36:06.205176115 CEST6535853192.168.2.58.8.8.8
          Apr 19, 2024 18:36:06.312657118 CEST53653588.8.8.8192.168.2.5
          Apr 19, 2024 18:36:06.312728882 CEST53653578.8.8.8192.168.2.5
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Apr 19, 2024 18:36:06.205009937 CEST192.168.2.58.8.8.80xfe42Standard query (0)www.dblikes.topA (IP address)IN (0x0001)false
          Apr 19, 2024 18:36:06.205176115 CEST192.168.2.58.8.8.80x9059Standard query (0)www.dblikes.top28IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Apr 19, 2024 18:36:06.312657118 CEST8.8.8.8192.168.2.50x9059No error (0)www.dblikes.topghs.googlehosted.comCNAME (Canonical name)IN (0x0001)false
          Apr 19, 2024 18:36:06.312657118 CEST8.8.8.8192.168.2.50x9059No error (0)ghs.googlehosted.com28IN (0x0001)false
          Apr 19, 2024 18:36:06.312728882 CEST8.8.8.8192.168.2.50xfe42No error (0)www.dblikes.topghs.googlehosted.comCNAME (Canonical name)IN (0x0001)false
          Apr 19, 2024 18:36:06.312728882 CEST8.8.8.8192.168.2.50xfe42No error (0)ghs.googlehosted.com173.194.209.121A (IP address)IN (0x0001)false

          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Target ID:0
          Start time:18:36:04
          Start date:19/04/2024
          Path:C:\Users\user\Desktop\wr.exe
          Wow64 process (32bit):false
          Commandline:"C:\Users\user\Desktop\wr.exe"
          Imagebase:0x5b0000
          File size:4'445'584 bytes
          MD5 hash:E2A072228078E6F3CF5073F4AF029913
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:Go lang
          Reputation:low
          Has exited:true

          Reset < >

            Execution Graph

            Execution Coverage:0.1%
            Dynamic/Decrypted Code Coverage:0%
            Signature Coverage:58.8%
            Total number of Nodes:17
            Total number of Limit Nodes:2
            execution_graph 45112 616e60 45113 616e99 VirtualAlloc 45112->45113 45114 616e88 45112->45114 45114->45113 45115 d9a750 45118 d9a7c0 45115->45118 45119 d9a7c5 45118->45119 45120 d9a8d4 LoadLibraryA 45119->45120 45126 d9a91e VirtualProtect VirtualProtect 45119->45126 45121 d9a8ee 45120->45121 45121->45119 45122 d9a8f7 GetProcAddress 45121->45122 45122->45121 45125 d9a918 ExitProcess 45122->45125 45124 d9a9b6 45124->45124 45126->45124 45127 5e3e80 45128 5e3e86 45127->45128 45128->45127 45129 5e3eb9 45128->45129 45131 617300 SetWaitableTimer 45128->45131 45132 61737f 45131->45132 45132->45129

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 0 d9a7c0-d9a7c3 1 d9a7cd-d9a7d1 0->1 2 d9a7dd 1->2 3 d9a7d3-d9a7db 1->3 4 d9a7df-d9a7e2 2->4 5 d9a7c5-d9a7ca 2->5 3->2 6 d9a7eb-d9a7f2 4->6 5->1 8 d9a7fe 6->8 9 d9a7f4-d9a7fc 6->9 10 d9a800-d9a803 8->10 11 d9a7e4-d9a7e9 8->11 9->8 12 d9a81e-d9a820 10->12 13 d9a805-d9a813 10->13 11->6 16 d9a82a 12->16 17 d9a822-d9a828 12->17 14 d9a86d-d9a888 13->14 15 d9a815-d9a81a 13->15 21 d9a8b9-d9a8bc 14->21 19 d9a81c 15->19 20 d9a854-d9a857 15->20 16->20 22 d9a82c-d9a830 16->22 17->16 19->22 31 d9a859-d9a868 call d9a782 20->31 23 d9a8be-d9a8bf 21->23 24 d9a8c1-d9a8c7 21->24 25 d9a83a 22->25 26 d9a832-d9a838 22->26 28 d9a8a0-d9a8a4 23->28 29 d9a8ce-d9a8d2 24->29 25->20 30 d9a83c-d9a843 25->30 26->25 34 d9a88a-d9a88d 28->34 35 d9a8a6-d9a8a9 28->35 32 d9a91e-d9a926 29->32 33 d9a8d4-d9a8ec LoadLibraryA 29->33 48 d9a84d 30->48 49 d9a845-d9a84b 30->49 31->1 40 d9a92a-d9a933 32->40 38 d9a8ee-d9a8f5 33->38 34->24 39 d9a88f 34->39 35->24 36 d9a8ab-d9a8af 35->36 42 d9a8b1-d9a8b8 36->42 43 d9a890-d9a894 36->43 38->29 45 d9a8f7-d9a90d GetProcAddress 38->45 39->43 46 d9a962-d9a9b1 VirtualProtect * 2 40->46 47 d9a935-d9a937 40->47 42->21 43->28 54 d9a896-d9a898 43->54 52 d9a918 ExitProcess 45->52 53 d9a90f-d9a916 45->53 51 d9a9b6-d9a9bb 46->51 55 d9a939-d9a948 47->55 56 d9a94a-d9a958 47->56 48->30 50 d9a84f-d9a852 48->50 49->48 50->31 51->51 58 d9a9bd-d9b030 51->58 53->38 54->28 59 d9a89a-d9a89e 54->59 55->40 56->55 57 d9a95a-d9a960 56->57 57->55 59->28 59->35
            APIs
            • LoadLibraryA.KERNEL32 ref: 00D9A8E6
            • GetProcAddress.KERNEL32 ref: 00D9A904
            • VirtualProtect.KERNELBASE(?,?,?,00000000), ref: 00D9A989
            • VirtualProtect.KERNELBASE ref: 00D9A9A7
            Memory Dump Source
            • Source File: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID: ProtectVirtual$AddressLibraryLoadProc
            • String ID:
            • API String ID: 3300690313-0
            • Opcode ID: 7d3bf6b3c3a184bc2c8824ec2578db003a582a91b4c17481c9f146442b4b0725
            • Instruction ID: ef214a0b29ea1b3771c68663f5ba378b1de8c84d0a2685399ac938091e37c607
            • Opcode Fuzzy Hash: 7d3bf6b3c3a184bc2c8824ec2578db003a582a91b4c17481c9f146442b4b0725
            • Instruction Fuzzy Hash: A1515223B5125196DF245BBCAD843A867A1E7057B4F8C4336CBBD433C5EA68C84783B2
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 61 617300-617376 SetWaitableTimer 62 61737f-617388 61->62
            APIs
            • SetWaitableTimer.KERNELBASE ref: 00617361
            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID: TimerWaitable
            • String ID:
            • API String ID: 1823812067-0
            • Opcode ID: 2b08c3f2551288a64fb59bf88715c0fef3be7b33fb2fbd41e23685c7eed74307
            • Instruction ID: 58715df1a1750b6632fb2ffc065be4eb7d2ba5ec83ccc7932d9f5976b4d70e4c
            • Opcode Fuzzy Hash: 2b08c3f2551288a64fb59bf88715c0fef3be7b33fb2fbd41e23685c7eed74307
            • Instruction Fuzzy Hash: FD01B676225F8485DA508B4AE8A035A7360F3C9FA4F545222EEAD977A4CF39C1218B00
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 63 616e60-616e86 64 616e99-616edf VirtualAlloc 63->64 65 616e88-616e8b 63->65 66 616e8d 65->66 67 616e8f-616e96 65->67 66->67 67->64
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID: AllocVirtual
            • String ID:
            • API String ID: 4275171209-0
            • Opcode ID: 33b54bf97a7912f954cb5ac1813d54e14e05c2a316259aa94b24e2224a416175
            • Instruction ID: 9e0d2406965e0cc46b00aae48087181261bb1e41accb4794bbccd779749559b8
            • Opcode Fuzzy Hash: 33b54bf97a7912f954cb5ac1813d54e14e05c2a316259aa94b24e2224a416175
            • Instruction Fuzzy Hash: 8EF064BAA01B8082DB218B1AE9403683370F74CBE8F244216DE5DA3B20CB29E192C200
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            • tracebackunderflowunhandledwbufSpanswebsocketwinmm.dll} stack=[ netGo = MB goal, flushGen gfreecnt= heapGoal= pages at ptrSize= runqsize= runqueue= s.base()= spinning= stopwait= stream=%d sweepgen sweepgen= targetpc= throwing= until pc=%!Weekday(%s|%s%s, xrefs: 0060889A
            • stack=[_NewEnum_gatewayaddress avx512bwavx512cdavx512dqavx512eravx512pfavx512vlbad instcgocheckcontinuecs deadlockexecwaitexporterfinishedfs gs hijackedhttp/1.1if-matchif-rangeinvalid locationno anodeno-cacheno_proxypollDescr10 r11 r12 , xrefs: 00607E45
            • runtime., xrefs: 006082F2
            • : unknown pc Accept-RangesAuthorizationCLIENT_RANDOMCONNECT_ERRORCache-ControlCertOpenStoreCoTaskMemFreeConnectServerContent-RangeDeleteServiceECDSAWithSHA1EnumProcessesExitWindowsExFQDN too longFindFirstFileFindNextFileWFindResourceWFreeAddrInfoWGC sweep wait, xrefs: 00606F3C
            • : frame.sp=BLAKE2b-256BLAKE2b-384BLAKE2b-512BLAKE2s-256Bad GatewayBad RequestClassHESIODCloseHandleCoGetObjectCreateFileWDeleteFileWDives_AkuruENABLE_PUSHEND_HEADERSESTABLISHEDEarly HintsEnumWindowsEnvironmentExitProcessFreeLibraryGOMEMLIMIT=GOTRACEBACKGetFile, xrefs: 00607DD7
            • unknown caller pcunknown type kindunrecognized namewait for GC cyclewrong medium typex-forwarded-proto but memory size because dotdotdot in async preempt to non-Go memory , locked to thread/etc/nsswitch.conf298023223876953125: day out of rangeArab Standard , xrefs: 00608834
            • ] n=allgallpasn1avx2basebindbitsbmi1bmi2boolcallcap cas1cas2cas3cas4cas5cas6chancx16datedeaddialermsetagfailfilefromftpsfuncgziphosthourhttpicmpidleigmpinetint8itabkindlinkopenpipepop3quitreadrootsbrksmtpsse2sse3tcp4tcp6trueudp4udp6uintunixvaryxn-- ... MB, a, xrefs: 00607E85
            • called from flushedWork idlethreads= in duration in host name is nil, not nStackRoots= out of range pluginpath= s.spanclass= span.base()= syscalltick= work.nproc= work.nwait= , gp->status=, not pointer-byte block (3814697265625: unknown pc Accept-Ranges, xrefs: 0060762F
            • gopa, xrefs: 00608309
            • sp=%x&gt;&lt;) = ) m=+Inf-Inf.css.gif.htm.jpg.mjs.pdf.png.svg.xml0x%x10803125: p=ACDTACSTAEDTAESTAKDTAKSTAWSTAhomAtoiCESTChamDATADashDateEESTEtagFromGOGCGoneHostJulyJuneLEAFLisuMiaoModiNZDTNZSTNameNewaPINGPOSTSASTStatThaiTypem=] = ] n=allgallpasn1avx2base, xrefs: 00607F1B, 006084FC
            • gentraceback callback cannot be used with non-zero skipmheap.freeSpanLocked - invalid free of user arena chunknet/http: invalid byte %q in %s; dropping invalid bytesnet/http: request canceled while waiting for connectionos: invalid use of WriteAt on file opene, xrefs: 006088BC
            • panicparsepop3srangerune scav schedsleepslicesockssse41sse42ssse3sudogsweeptext/tls: traceuint8usageutf-8write B -> FROM Value addr= alloc base code= ctxt: curg= free goid jobs= list= m->p= max= min= next= p->m= prev= span=% util(...), i = , not , val , xrefs: 00608327
            • fp= is lr: of on pc= sp: sp=%x&gt;&lt;) = ) m=+Inf-Inf.css.gif.htm.jpg.mjs.pdf.png.svg.xml0x%x10803125: p=ACDTACSTAEDTAESTAKDTAKSTAWSTAhomAtoiCESTChamDATADashDateEESTEtagFromGOGCGoneHostJulyJuneLEAFLisuMiaoModiNZDTNZSTNameNewaPINGPOSTSASTStatThaiTypem=, xrefs: 006084DE
            • (...), i = , not , val .local.onion390625<-chanAcceptAnswerArabicAugustBasic BrahmiCANCELCLOSEDCarianChakmaCommonCookieCopticDELETEExpectFormatFridayGOAWAYGetACPGothicHangulHatranHebrewHyphenKaithiKhojkiLISTENLengthLepchaLockedLycianLydianMondayPADDEDPragmaRe, xrefs: 00608125
            • traceback did not unwind completelytransform: short destination buffertransport endpoint is not connectedunsupported signature algorithm: %vx509: decryption password incorrectx509: invalid authority info accessx509: malformed extension OID fieldx509: wrong Ed2, xrefs: 00607ECF
            • gentraceback cannot trace user goroutine on its own stackreceived record with version %x when expecting version %xruntime: checkmarks found unexpected unmarked object obj=sync: WaitGroup misuse: Add called concurrently with Waittls: Ed25519 public keys are not, xrefs: 006088AB
            • traceback stuckunexpected typeunknown Go typeunknown networkunknown versionwindows-servicewrite error: %wx-forwarded-for already; errno= mheap.sweepgen= not in ranges: untyped locals %s %s HTTP/1.1, not a function.WithValue(type /etc/resolv.conf0123456789AB, xrefs: 00607F65
            • unknown pcuser-agentuser32.dllws2_32.dll of size (targetpc= , plugin: ErrCode=%v KiB work, exp.) for freeindex= gcwaiting= idleprocs= in status mallocing= ms clock, nBSSRoots= p->status= s.nelems= schedtick= span.list= timerslen=) at entry+, elemsize=, xrefs: 00606FA9
            • runtime: traceback stuck. pc=scanobject of a noscan objectsemacquire not on the G stackstring concatenation too longsyntax error scanning booleantimeBegin/EndPeriod not foundtls: invalid NextProtos valuetls: invalid server key sharetls: too many ignored record, xrefs: 00607EFD
            • max= ms, ptr tab= top=%s %q%s*%d%s=%s&#34;&#39;&amp;+0330+0430+0530+0545+0630+0845+1030+1245+1345, fp:-0930.avif.html.jpeg.json.wasm.webp1562578125:***@:path<nil>AdlamAprilBamumBatakBuhidCall ClassCountDograECDSAErrorFoundGreekHTTP/KhmerLatinLimbuLocalMarch, xrefs: 00607EA5
            • top=%s %q%s*%d%s=%s&#34;&#39;&amp;+0330+0430+0530+0545+0630+0845+1030+1245+1345, fp:-0930.avif.html.jpeg.json.wasm.webp1562578125:***@:path<nil>AdlamAprilBamumBatakBuhidCall ClassCountDograECDSAErrorFoundGreekHTTP/KhmerLatinLimbuLocalMarchNushuOghamOriyaOsage, xrefs: 00607DF5
            • runtime: g runtime: p scheddetailsechost.dllsecur32.dllshell32.dllshort writetls: alert(tracealloc(traffic updunreachableuserenv.dllversion.dll (sensitive) B (goal KiB total, MB stacks, [recovered] allocCount found at *( gcscandone m->gsignal= maxTri, xrefs: 00606F1E, 006075EB
            • runtime: gs.state = schedtracesemacquireset-cookiesetsockoptskipping: socks bindstackLarget.Kind == terminatedtracefree(tracegc()unixpacketunknown pcuser-agentuser32.dllws2_32.dll of size (targetpc= , plugin: ErrCode=%v KiB work, exp.) for freeindex= gc, xrefs: 00607DB9
            • : unexpected return pc for CertEnumCertificatesInStoreCurveP256CurveP384CurveP521DATA frame with stream ID 0Easter Island Standard TimeFindCloseChangeNotificationG waiting list is corruptedGetSecurityDescriptorLengthGetUserPreferredUILanguagesNAF digits must f, xrefs: 00607609
            • traceback: unexpected SPWRITE function trailing backslash at end of expressiontransport endpoint is already connectedusername/password authentication failedwmi: cannot load field %q into a %q: %sx509: failed to parse URI constraint %qx509: invalid NameConstrai, xrefs: 0060886A
            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID: stack=[_NewEnum_gatewayaddress avx512bwavx512cdavx512dqavx512eravx512pfavx512vlbad instcgocheckcontinuecs deadlockexecwaitexporterfinishedfs gs hijackedhttp/1.1if-matchif-rangeinvalid locationno anodeno-cacheno_proxypollDescr10 r11 r12 $ called from flushedWork idlethreads= in duration in host name is nil, not nStackRoots= out of range pluginpath= s.spanclass= span.base()= syscalltick= work.nproc= work.nwait= , gp->status=, not pointer-byte block (3814697265625: unknown pc Accept-Ranges$ fp= is lr: of on pc= sp: sp=%x&gt;&lt;) = ) m=+Inf-Inf.css.gif.htm.jpg.mjs.pdf.png.svg.xml0x%x10803125: p=ACDTACSTAEDTAESTAKDTAKSTAWSTAhomAtoiCESTChamDATADashDateEESTEtagFromGOGCGoneHostJulyJuneLEAFLisuMiaoModiNZDTNZSTNameNewaPINGPOSTSASTStatThaiTypem=$ max= ms, ptr tab= top=%s %q%s*%d%s=%s&#34;&#39;&amp;+0330+0430+0530+0545+0630+0845+1030+1245+1345, fp:-0930.avif.html.jpeg.json.wasm.webp1562578125:***@:path<nil>AdlamAprilBamumBatakBuhidCall ClassCountDograECDSAErrorFoundGreekHTTP/KhmerLatinLimbuLocalMarch$ sp=%x&gt;&lt;) = ) m=+Inf-Inf.css.gif.htm.jpg.mjs.pdf.png.svg.xml0x%x10803125: p=ACDTACSTAEDTAESTAKDTAKSTAWSTAhomAtoiCESTChamDATADashDateEESTEtagFromGOGCGoneHostJulyJuneLEAFLisuMiaoModiNZDTNZSTNameNewaPINGPOSTSASTStatThaiTypem=] = ] n=allgallpasn1avx2base$ top=%s %q%s*%d%s=%s&#34;&#39;&amp;+0330+0430+0530+0545+0630+0845+1030+1245+1345, fp:-0930.avif.html.jpeg.json.wasm.webp1562578125:***@:path<nil>AdlamAprilBamumBatakBuhidCall ClassCountDograECDSAErrorFoundGreekHTTP/KhmerLatinLimbuLocalMarchNushuOghamOriyaOsage$(...), i = , not , val .local.onion390625<-chanAcceptAnswerArabicAugustBasic BrahmiCANCELCLOSEDCarianChakmaCommonCookieCopticDELETEExpectFormatFridayGOAWAYGetACPGothicHangulHatranHebrewHyphenKaithiKhojkiLISTENLengthLepchaLockedLycianLydianMondayPADDEDPragmaRe$: frame.sp=BLAKE2b-256BLAKE2b-384BLAKE2b-512BLAKE2s-256Bad GatewayBad RequestClassHESIODCloseHandleCoGetObjectCreateFileWDeleteFileWDives_AkuruENABLE_PUSHEND_HEADERSESTABLISHEDEarly HintsEnumWindowsEnvironmentExitProcessFreeLibraryGOMEMLIMIT=GOTRACEBACKGetFile$: unexpected return pc for CertEnumCertificatesInStoreCurveP256CurveP384CurveP521DATA frame with stream ID 0Easter Island Standard TimeFindCloseChangeNotificationG waiting list is corruptedGetSecurityDescriptorLengthGetUserPreferredUILanguagesNAF digits must f$: unknown pc Accept-RangesAuthorizationCLIENT_RANDOMCONNECT_ERRORCache-ControlCertOpenStoreCoTaskMemFreeConnectServerContent-RangeDeleteServiceECDSAWithSHA1EnumProcessesExitWindowsExFQDN too longFindFirstFileFindNextFileWFindResourceWFreeAddrInfoWGC sweep wait$] n=allgallpasn1avx2basebindbitsbmi1bmi2boolcallcap cas1cas2cas3cas4cas5cas6chancx16datedeaddialermsetagfailfilefromftpsfuncgziphosthourhttpicmpidleigmpinetint8itabkindlinkopenpipepop3quitreadrootsbrksmtpsse2sse3tcp4tcp6trueudp4udp6uintunixvaryxn-- ... MB, a$gentraceback callback cannot be used with non-zero skipmheap.freeSpanLocked - invalid free of user arena chunknet/http: invalid byte %q in %s; dropping invalid bytesnet/http: request canceled while waiting for connectionos: invalid use of WriteAt on file opene$gentraceback cannot trace user goroutine on its own stackreceived record with version %x when expecting version %xruntime: checkmarks found unexpected unmarked object obj=sync: WaitGroup misuse: Add called concurrently with Waittls: Ed25519 public keys are not$gopa$panicparsepop3srangerune scav schedsleepslicesockssse41sse42ssse3sudogsweeptext/tls: traceuint8usageutf-8write B -> FROM Value addr= alloc base code= ctxt: curg= free goid jobs= list= m->p= max= min= next= p->m= prev= span=% util(...), i = , not , val $runtime.$runtime: g runtime: p scheddetailsechost.dllsecur32.dllshell32.dllshort writetls: alert(tracealloc(traffic updunreachableuserenv.dllversion.dll (sensitive) B (goal KiB total, MB stacks, [recovered] allocCount found at *( gcscandone m->gsignal= maxTri$runtime: gs.state = schedtracesemacquireset-cookiesetsockoptskipping: socks bindstackLarget.Kind == terminatedtracefree(tracegc()unixpacketunknown pcuser-agentuser32.dllws2_32.dll of size (targetpc= , plugin: ErrCode=%v KiB work, exp.) for freeindex= gc$runtime: traceback stuck. pc=scanobject of a noscan objectsemacquire not on the G stackstring concatenation too longsyntax error scanning booleantimeBegin/EndPeriod not foundtls: invalid NextProtos valuetls: invalid server key sharetls: too many ignored record$traceback did not unwind completelytransform: short destination buffertransport endpoint is not connectedunsupported signature algorithm: %vx509: decryption password incorrectx509: invalid authority info accessx509: malformed extension OID fieldx509: wrong Ed2$traceback stuckunexpected typeunknown Go typeunknown networkunknown versionwindows-servicewrite error: %wx-forwarded-for already; errno= mheap.sweepgen= not in ranges: untyped locals %s %s HTTP/1.1, not a function.WithValue(type /etc/resolv.conf0123456789AB$traceback: unexpected SPWRITE function trailing backslash at end of expressiontransport endpoint is already connectedusername/password authentication failedwmi: cannot load field %q into a %q: %sx509: failed to parse URI constraint %qx509: invalid NameConstrai$tracebackunderflowunhandledwbufSpanswebsocketwinmm.dll} stack=[ netGo = MB goal, flushGen gfreecnt= heapGoal= pages at ptrSize= runqsize= runqueue= s.base()= spinning= stopwait= stream=%d sweepgen sweepgen= targetpc= throwing= until pc=%!Weekday(%s|%s%s$unknown caller pcunknown type kindunrecognized namewait for GC cyclewrong medium typex-forwarded-proto but memory size because dotdotdot in async preempt to non-Go memory , locked to thread/etc/nsswitch.conf298023223876953125: day out of rangeArab Standard $unknown pcuser-agentuser32.dllws2_32.dll of size (targetpc= , plugin: ErrCode=%v KiB work, exp.) for freeindex= gcwaiting= idleprocs= in status mallocing= ms clock, nBSSRoots= p->status= s.nelems= schedtick= span.list= timerslen=) at entry+, elemsize=
            • API String ID: 0-1997802532
            • Opcode ID: 4e80f16eea02150e7333b7c8faee4272fb7bc035b0b483cf60a8b4b45d1f7b42
            • Instruction ID: 323d5085de741439ac9c3d56a7c61b9c12eb59b47b9e4b81a6fa8da5fc4311be
            • Opcode Fuzzy Hash: 4e80f16eea02150e7333b7c8faee4272fb7bc035b0b483cf60a8b4b45d1f7b42
            • Instruction Fuzzy Hash: 89E2F036648BC586CAB99B12E4843EFB769F789B94F444116EECD43B99CF38C591CB00
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1492 5d41e0-5d41e9 1493 5d4eed-5d4f05 call 6133a0 1492->1493 1494 5d41ef-5d4211 1492->1494 1493->1492 1496 5d4229-5d422e 1494->1496 1497 5d4213-5d421a 1494->1497 1500 5d4237-5d424f 1496->1500 1501 5d4230 1496->1501 1497->1496 1499 5d421c-5d4223 1497->1499 1499->1496 1502 5d4edb-5d4eec call 5e6960 1499->1502 1503 5d4e58-5d4ed6 call 5e82a0 call 5e8ba0 call 5e88a0 call 5e8ba0 call 5e88a0 call 5e8ba0 call 5e88a0 call 5e8500 call 5e8320 call 5e6960 1500->1503 1504 5d4255-5d4264 1500->1504 1501->1500 1502->1493 1503->1502 1504->1503 1506 5d426a-5d4282 1504->1506 1509 5d4284-5d42a2 call 606380 1506->1509 1510 5d42a7-5d42ef 1506->1510 1509->1510 1512 5d42fa-5d4305 1510->1512 1515 5d430b-5d4313 1512->1515 1516 5d4400-5d4403 1512->1516 1519 5d4319-5d4355 1515->1519 1520 5d4e53 call 5e4e80 1515->1520 1522 5d4409-5d4411 1516->1522 1523 5d4494-5d449b 1516->1523 1525 5d43c5-5d43c9 1519->1525 1526 5d4357-5d435c 1519->1526 1520->1503 1522->1523 1524 5d4417-5d4436 1522->1524 1527 5d449d-5d44a4 1523->1527 1528 5d44a6-5d4c44 1523->1528 1532 5d443c-5d4470 1524->1532 1533 5d4d85-5d4d8d call 615a20 1524->1533 1538 5d4d95-5d4d98 1525->1538 1534 5d435e-5d4372 1526->1534 1535 5d4374-5d43b0 call 5d8e20 1526->1535 1527->1528 1536 5d44f4-5d44fc 1527->1536 1528->1536 1542 5d4c4a-5d4c63 1528->1542 1540 5d4d7b-5d4d80 call 615a20 1532->1540 1541 5d4476-5d4490 1532->1541 1557 5d4d92 1533->1557 1543 5d43b8-5d43c0 1534->1543 1535->1543 1545 5d44fe-5d4533 1536->1545 1546 5d4576-5d4590 1536->1546 1548 5d4d9e-5d4da6 1538->1548 1549 5d43e2 1538->1549 1540->1533 1541->1523 1551 5d4c69-5d4c75 1542->1551 1552 5d4cf2-5d4d04 1542->1552 1558 5d42f1-5d42f5 1543->1558 1555 5d456d-5d4571 1545->1555 1556 5d4535-5d4568 call 5d4fc0 1545->1556 1561 5d4599-5d45a3 1546->1561 1559 5d43dd-5d43e0 1548->1559 1560 5d4dac-5d4db1 1548->1560 1562 5d43e4-5d43f2 1549->1562 1569 5d4c77-5d4c8f 1551->1569 1570 5d4c91-5d4ca4 1551->1570 1571 5d4d18-5d4d1b 1552->1571 1572 5d4d06-5d4d16 1552->1572 1565 5d4bc8-5d4bd7 1555->1565 1556->1555 1557->1538 1558->1512 1559->1562 1560->1557 1566 5d4db3 1560->1566 1567 5d45a5-5d45bb 1561->1567 1568 5d4610-5d4624 1561->1568 1573 5d4db8-5d4dc3 1562->1573 1565->1546 1583 5d4bdd-5d4bfb 1565->1583 1566->1573 1574 5d45bd-5d45c2 1567->1574 1575 5d45c4-5d460e call 5b2160 1567->1575 1578 5d4b09-5d4bc0 call 5e82a0 call 5e8ba0 call 5e88a0 call 5e8ba0 call 5e88a0 call 5e8ba0 call 5e88a0 call 5e8ba0 call 5e88a0 call 5e8500 call 5e8320 call 5e6960 1568->1578 1579 5d462a-5d4649 1568->1579 1569->1552 1569->1570 1580 5d4ce5-5d4cec 1570->1580 1581 5d4ca6-5d4ce0 call 5de620 1570->1581 1584 5d4d23-5d4d39 1571->1584 1572->1584 1573->1558 1576 5d4dc9-5d4dd1 1573->1576 1588 5d4592-5d4596 1574->1588 1575->1588 1576->1558 1589 5d4dd7-5d4de2 1576->1589 1587 5d4bc5 1578->1587 1592 5d466c-5d46a3 call 5d8f60 call 5c41c0 1579->1592 1593 5d464b-5d4665 1579->1593 1580->1552 1595 5d4cee-5d4cf0 1580->1595 1581->1580 1586 5d4bfd-5d4c2f call 5d4fc0 1583->1586 1583->1587 1596 5d4d3b-5d4d4b 1584->1596 1597 5d4d50-5d4d5b 1584->1597 1586->1587 1587->1565 1588->1561 1600 5d4dfe-5d4e4e call 5d8e20 1589->1600 1601 5d4de4-5d4de6 1589->1601 1624 5d46a9-5d46b2 1592->1624 1625 5d4a87-5d4b04 call 5e82a0 call 5e8ba0 call 5e88a0 call 5e8ba0 call 5e88a0 call 5e8ba0 call 5e88a0 call 5e8500 call 5e8320 call 5e6960 1592->1625 1593->1592 1606 5d4d71-5d4d74 1595->1606 1607 5d4d65-5d4d6d 1597->1607 1600->1573 1601->1600 1611 5d4de8-5d4dfc 1601->1611 1606->1607 1608 5d4d76 1606->1608 1607->1606 1608->1552 1611->1573 1624->1625 1629 5d46b8-5d46c2 1624->1629 1625->1578 1633 5d46c8-5d46cd 1629->1633 1634 5d4a76-5d4a82 call 5e6960 1629->1634 1633->1634 1638 5d46d3-5d46e0 1633->1638 1634->1625 1639 5d46e6-5d46f1 1638->1639 1640 5d47c3-5d47ce 1638->1640 1643 5d4a65-5d4a71 call 5e6960 1639->1643 1644 5d46f7-5d4703 1639->1644 1646 5d493c-5d4947 1640->1646 1647 5d47d4-5d47dc 1640->1647 1643->1634 1651 5d4705-5d4710 1644->1651 1652 5d4751-5d47c2 call 613260 1644->1652 1649 5d494d-5d4955 1646->1649 1650 5d4a15-5d4a26 1646->1650 1654 5d47ee-5d4814 call 5df8e0 1647->1654 1655 5d47de-5d47e9 1647->1655 1659 5d495b-5d4962 1649->1659 1660 5d49e3-5d49ea 1649->1660 1661 5d4a58-5d4a60 call 615a00 1651->1661 1662 5d4716-5d4750 call 5df240 1651->1662 1684 5d4a4b-5d4a53 call 615a00 1654->1684 1685 5d481a-5d4871 call 5df9c0 1654->1685 1665 5d4876 1655->1665 1668 5d497c-5d4983 call 5d7de0 1659->1668 1669 5d4964-5d497a call 5c7540 1659->1669 1673 5d49ec-5d4a10 call 5df240 1660->1673 1674 5d4a27-5d4a2e call 615a00 1660->1674 1661->1643 1665->1650 1676 5d487c-5d4884 1665->1676 1691 5d4988-5d49e2 call 5df8e0 call 5df9c0 1668->1691 1669->1691 1673->1650 1694 5d4a33-5d4a3a call 615a00 1674->1694 1687 5d491b-5d493b call 5d7de0 1676->1687 1688 5d488a-5d4891 1676->1688 1684->1661 1685->1665 1695 5d48e0-5d48e7 1688->1695 1696 5d4893-5d48a7 1688->1696 1705 5d4a3f-5d4a46 call 615a00 1694->1705 1695->1694 1706 5d48ed-5d4916 call 5df240 1695->1706 1704 5d48ad-5d48d6 call 5df240 1696->1704 1696->1705 1704->1650 1705->1684 1706->1650
            Strings
            • nalloc= newval= nfreed= packed= ping=%q pointer stack=[ status %!Month(%02d%02d2.5.4.102.5.4.112.5.4.1748828125AcceptExAcceptedArmenianBAD RANKBalineseBopomofoBugineseCancelIoCherokeeClassANYConflictContinueCurveID(CyrillicDNS nameDSA-SHA1DecemberDuployanEqua, xrefs: 005D4B45
            • mspan.sweep: m is not lockedmultipart: message too largenewproc1: new g is not Gdeadnewproc1: newg missing stackos: process already finishedpending ASN.1 child too longprotocol driver not attachedreflect.MakeSlice: len > capregion exceeds uintptr rangeruntime., xrefs: 005D4EDB
            • mspan.sweep: bad span statenet/http: invalid method %qnet/http: use last responsenot a XENIX named type fileprogToPointerMask: overflowreflect.Value.UnsafePointerrunlock of unlocked rwmutexruntime: asyncPreemptStack=runtime: checkdead: find g runtime: checkdea, xrefs: 005D4ECA
            • previous allocCount=, levelBits[level] = 186264514923095703125931322574615478515625AdjustTokenPrivilegesAlaskan Standard TimeAnatolian_HieroglyphsArabian Standard TimeBelarus Standard TimeCM_Get_DevNode_StatusCentral Standard TimeChangeServiceConfig2WDeregist, xrefs: 005D4B65
            • sweepgen= targetpc= throwing= until pc=%!Weekday(%s|%s%s|%s, bound = , limit = .localhost/dev/stdin/etc/hosts122070312561035156258.8.8.8:53: parsing :authorityAdditionalBad varintCLOSE_WAITCancelIoExChorasmianClassCHAOSClassCSNETConnectionContent-IdCreateFile, xrefs: 005D4AB2, 005D4E85
            • mheap.sweepgen= not in ranges: untyped locals %s %s HTTP/1.1, not a function.WithValue(type /etc/resolv.conf0123456789ABCDEF0123456789abcdef2384185791015625: value of type Already ReportedCoCreateInstanceConnectNamedPipeContent-EncodingContent-LanguageCont, xrefs: 005D4ACF, 005D4EA5
            • sweep increased allocation countsync: Unlock of unlocked RWMutexsync: negative WaitGroup countertls: NextProtos values too largetls: unknown Renegotiation valuetransform: short internal bufferuse of closed network connectionx509: ECDSA verification failurex509, xrefs: 005D4BAF
            • swept cached spansync.RWMutex.Lockthread exhaustiontransfer-encodingtruncated headersunknown caller pcunknown type kindunrecognized namewait for GC cyclewrong medium typex-forwarded-proto but memory size because dotdotdot in async preempt to non-Go memory ,, xrefs: 005D4A76
            • mspan.sweep: state=multipartmaxheadersnegative coordinatenetwork unreachablenot implemented yetnotesleep not on g0ntdll.dll not foundnwait > work.nprocspanic during mallocpanic during panicpanic holding lockspanicwrap: no ( in panicwrap: no ) in proxy-authori, xrefs: 005D4A94, 005D4E65
            • mspan.sweep: bad span state after sweepout of memory allocating heap arena mapruntime: blocked write on free polldescruntime: casfrom_Gscanstatus failed gp=stack growth not allowed in system callsuspendG from non-preemptible goroutinetags don't match (%d vs %+, xrefs: 005D4AF8
            • runtime: nelems=schedule: in cgotime: bad [0-9]*unknown network unpacking headerworkbuf is emptywww-authenticate spinningthreads=%%!%c(big.Int=%s), p.searchAddr = 0123456789ABCDEFX0123456789abcdefx060102150405Z07001192092895507812559604644775390625: missing me, xrefs: 005D4B25
            • sweep: tried to preserve a user arena spansync/atomic: store of nil value into Valueunexpected signal during runtime executionupdateStatus with no service status handlex509: %q cannot be encoded as an IA5Stringx509: RSA modulus is not a positive numberError en, xrefs: 005D4A65
            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID: mheap.sweepgen= not in ranges: untyped locals %s %s HTTP/1.1, not a function.WithValue(type /etc/resolv.conf0123456789ABCDEF0123456789abcdef2384185791015625: value of type Already ReportedCoCreateInstanceConnectNamedPipeContent-EncodingContent-LanguageCont$ nalloc= newval= nfreed= packed= ping=%q pointer stack=[ status %!Month(%02d%02d2.5.4.102.5.4.112.5.4.1748828125AcceptExAcceptedArmenianBAD RANKBalineseBopomofoBugineseCancelIoCherokeeClassANYConflictContinueCurveID(CyrillicDNS nameDSA-SHA1DecemberDuployanEqua$ previous allocCount=, levelBits[level] = 186264514923095703125931322574615478515625AdjustTokenPrivilegesAlaskan Standard TimeAnatolian_HieroglyphsArabian Standard TimeBelarus Standard TimeCM_Get_DevNode_StatusCentral Standard TimeChangeServiceConfig2WDeregist$ sweepgen= targetpc= throwing= until pc=%!Weekday(%s|%s%s|%s, bound = , limit = .localhost/dev/stdin/etc/hosts122070312561035156258.8.8.8:53: parsing :authorityAdditionalBad varintCLOSE_WAITCancelIoExChorasmianClassCHAOSClassCSNETConnectionContent-IdCreateFile$mspan.sweep: bad span state after sweepout of memory allocating heap arena mapruntime: blocked write on free polldescruntime: casfrom_Gscanstatus failed gp=stack growth not allowed in system callsuspendG from non-preemptible goroutinetags don't match (%d vs %+$mspan.sweep: bad span statenet/http: invalid method %qnet/http: use last responsenot a XENIX named type fileprogToPointerMask: overflowreflect.Value.UnsafePointerrunlock of unlocked rwmutexruntime: asyncPreemptStack=runtime: checkdead: find g runtime: checkdea$mspan.sweep: m is not lockedmultipart: message too largenewproc1: new g is not Gdeadnewproc1: newg missing stackos: process already finishedpending ASN.1 child too longprotocol driver not attachedreflect.MakeSlice: len > capregion exceeds uintptr rangeruntime.$mspan.sweep: state=multipartmaxheadersnegative coordinatenetwork unreachablenot implemented yetnotesleep not on g0ntdll.dll not foundnwait > work.nprocspanic during mallocpanic during panicpanic holding lockspanicwrap: no ( in panicwrap: no ) in proxy-authori$runtime: nelems=schedule: in cgotime: bad [0-9]*unknown network unpacking headerworkbuf is emptywww-authenticate spinningthreads=%%!%c(big.Int=%s), p.searchAddr = 0123456789ABCDEFX0123456789abcdefx060102150405Z07001192092895507812559604644775390625: missing me$sweep increased allocation countsync: Unlock of unlocked RWMutexsync: negative WaitGroup countertls: NextProtos values too largetls: unknown Renegotiation valuetransform: short internal bufferuse of closed network connectionx509: ECDSA verification failurex509$sweep: tried to preserve a user arena spansync/atomic: store of nil value into Valueunexpected signal during runtime executionupdateStatus with no service status handlex509: %q cannot be encoded as an IA5Stringx509: RSA modulus is not a positive numberError en$swept cached spansync.RWMutex.Lockthread exhaustiontransfer-encodingtruncated headersunknown caller pcunknown type kindunrecognized namewait for GC cyclewrong medium typex-forwarded-proto but memory size because dotdotdot in async preempt to non-Go memory ,
            • API String ID: 0-1960342452
            • Opcode ID: da58ad6b457c0a250145d7743fa2f752e54109cd7b5dabcd02e3b1d1f6cb3572
            • Instruction ID: fdae8e80a38a665eb7a2891d2fe8bfa87e2fa81336a5556d9ace22a328d26ca6
            • Opcode Fuzzy Hash: da58ad6b457c0a250145d7743fa2f752e54109cd7b5dabcd02e3b1d1f6cb3572
            • Instruction Fuzzy Hash: 1562BF32208BD186DB74DB19E4503AEBBA5F386B84F858127EACD43B55DF38C995CB00
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1730 5c9cc0-5c9ccc 1731 5caa48-5caa4d call 6133a0 1730->1731 1732 5c9cd2-5c9d03 1730->1732 1731->1730 1734 5c9d0c-5c9d0f 1732->1734 1735 5c9d05-5c9d0a 1732->1735 1737 5c9d12-5c9d1a 1734->1737 1735->1737 1738 5c9d1c-5c9d21 1737->1738 1739 5c9d23 1737->1739 1740 5c9d2a-5c9d95 call 6173c0 1738->1740 1739->1740 1743 5c9da7-5c9db9 call 6156c0 1740->1743 1744 5c9d97-5c9da5 1740->1744 1745 5c9dbc-5c9e8c call 5eae20 call 613260 * 2 call 5eae20 1743->1745 1744->1745 1756 5c9e8e-5c9ea2 call 605120 1745->1756 1757 5c9ea7-5c9ec1 1745->1757 1756->1757 1759 5c9ed0-5c9eda call 615680 1757->1759 1760 5c9ec3-5c9ece 1757->1760 1761 5c9edf-5c9ee6 1759->1761 1760->1761 1763 5c9eec-5ca19c call 613260 call 6173c0 call 617460 call 5ba0e0 1761->1763 1764 5caa36-5caa47 call 5e6960 1761->1764 1775 5ca19e 1763->1775 1776 5ca1a4-5ca1e6 call 5bb7e0 call 5ef400 call 5bba00 call 5cbdc0 1763->1776 1764->1731 1775->1776 1785 5ca1e7-5ca222 1776->1785 1785->1785 1786 5ca224-5ca234 1785->1786 1787 5ca259-5ca25f 1786->1787 1788 5ca236-5ca24d 1786->1788 1789 5ca260 1787->1789 1788->1786 1790 5ca24f-5ca257 1788->1790 1791 5caa25-5caa31 call 5e6960 1789->1791 1792 5ca266-5ca305 call 613260 call 5dd760 call 5d6060 call 613260 * 2 call 5d38e0 1789->1792 1790->1789 1791->1764 1806 5ca30b-5ca362 call 5e82a0 1792->1806 1807 5ca8f7-5ca932 call 5bb7e0 1792->1807 1812 5ca367-5ca36b 1806->1812 1813 5ca934-5ca940 1807->1813 1814 5ca942-5ca94b call 6156a0 1807->1814 1815 5ca36d-5ca371 1812->1815 1816 5ca373-5ca398 1812->1816 1817 5ca950-5ca968 call 5bba00 1813->1817 1814->1817 1815->1816 1820 5ca3c3-5ca3c7 1815->1820 1821 5ca39e-5ca3b2 1816->1821 1822 5caa14-5caa20 call 615a00 1816->1822 1829 5ca99c-5ca9a7 1817->1829 1827 5ca3cd-5ca4f2 call 5fe840 call 5e82a0 call 5e8ba0 call 5e88a0 call 5e8ba0 * 3 call 5e89a0 call 5e8ba0 call 5e8320 1820->1827 1828 5caa0a-5caa0f call 615a00 1820->1828 1825 5ca364 1821->1825 1826 5ca3b4-5ca3c1 1821->1826 1822->1791 1825->1812 1826->1825 1862 5ca560-5ca564 1827->1862 1828->1822 1832 5ca9a9-5ca9e6 call 5f8d00 * 2 1829->1832 1833 5ca96a-5ca999 call 5b41e0 1829->1833 1846 5ca9e8-5ca9f0 1832->1846 1847 5ca9fa-5caa09 1832->1847 1833->1829 1846->1847 1849 5ca9f2 1846->1849 1849->1847 1863 5ca566-5ca583 1862->1863 1864 5ca5c0-5ca64c call 5e82a0 call 5e8ba0 call 5e8320 1862->1864 1866 5ca589-5ca5b9 call 5e82a0 call 5e8ba0 call 5e8320 1863->1866 1867 5ca4f4-5ca55e call 5cbae0 call 5fe840 call 5e82a0 call 5e8ba0 call 5e8320 1863->1867 1885 5ca6b2-5ca6b6 1864->1885 1866->1867 1867->1862 1887 5ca6b8-5ca6ce 1885->1887 1888 5ca734-5ca8a2 call 5e82a0 call 5e8ba0 call 5e88a0 call 5e8ba0 call 5e88a0 call 5e8ba0 call 5e88a0 call 5e8ba0 call 5e88a0 call 5e8ba0 call 5e88a0 call 5e8ba0 call 5e88a0 call 5e8ba0 call 5e89a0 call 5e8ba0 call 5e8320 1885->1888 1890 5ca6d6-5ca6f6 call 5e82a0 call 5e8ba0 call 5e8320 1887->1890 1891 5ca6d0-5ca6d4 1887->1891 1953 5ca8a4-5ca8bf call 5e82a0 call 5e8ba0 call 5e8320 1888->1953 1954 5ca8c0-5ca8e7 call 5e82a0 call 5e8500 call 5e8320 1888->1954 1900 5ca64e-5ca6af call 5cbae0 call 5fe840 call 5e82a0 call 5e8ba0 call 5e8320 1890->1900 1891->1890 1894 5ca700-5ca703 1891->1894 1894->1900 1901 5ca709-5ca72f call 5e82a0 call 5e8ba0 call 5e8320 1894->1901 1900->1885 1901->1900 1953->1954 1954->1807 1967 5ca8e9-5ca8f2 call 5bba00 1954->1967 1967->1807
            Strings
            • MB goal, flushGen gfreecnt= heapGoal= pages at ptrSize= runqsize= runqueue= s.base()= spinning= stopwait= stream=%d sweepgen sweepgen= targetpc= throwing= until pc=%!Weekday(%s|%s%s|%s, bound = , limit = .localhost/dev/stdin/etc/hosts12207031256103515625, xrefs: 005CA829
            • MB globals, MB) workers= called from flushedWork idlethreads= in duration in host name is nil, not nStackRoots= out of range pluginpath= s.spanclass= span.base()= syscalltick= work.nproc= work.nwait= , gp->status=, not pointer-byte block (3814697265625, xrefs: 005CA867
            • ., xrefs: 005CA3B4
            • (forced) -> node= B exp.) B work ( blocked= in use) lockedg= lockedm= m->curg= marked ms cpu, not in [ runtime= s.limit= s.state= threads= unmarked wbuf1.n= wbuf2.n=%s %q: %s%s %x %x(unknown), newval=, oldval=, size = , tail = 244140625: status=Authorit, xrefs: 005CA8A9
            • gc done but gcphase != _GCoffgfput: bad status (not Gdead)http2: client conn not usablehttp2: client connection losthttp: idle connection timeoutinteger not minimally-encodedinternal error: took too muchinvalid P256 element encodinginvalid character class rang, xrefs: 005CAA36
            • gcinggscanhchanhostshttpsimap2imap3imapsinet4inet6init int16int32int64matchmheapmonthntohspanicparsepop3srangerune scav schedsleepslicesockssse41sse42ssse3sudogsweeptext/tls: traceuint8usageutf-8write B -> FROM Value addr= alloc base code= ctxt: curg= free , xrefs: 005C9D97, 005C9DAD
            • ms clock, nBSSRoots= p->status= s.nelems= schedtick= span.list= timerslen=) at entry+, elemsize=, npages = , settings:.WithCancel/dev/stderr/dev/stdout/index.html30517578125: frame.sp=BLAKE2b-256BLAKE2b-384BLAKE2b-512BLAKE2s-256Bad GatewayBad RequestClassHE, xrefs: 005CA5C5
            • failed to set sweep barrierframe_pushpromise_pad_shortframe_rststream_zero_streamgcstopm: not waiting for gcgrowslice: len out of rangehkdf: entropy limit reachedhttp chunk length too largehttp2: response body closedinput overflows the modulusinsufficient secu, xrefs: 005CAA25
            • MB, and cnt= got= max= ms, ptr tab= top=%s %q%s*%d%s=%s&#34;&#39;&amp;+0330+0430+0530+0545+0630+0845+1030+1245+1345, fp:-0930.avif.html.jpeg.json.wasm.webp1562578125:***@:path<nil>AdlamAprilBamumBatakBuhidCall ClassCountDograECDSAErrorFoundGreekHTTP/Khmer, xrefs: 005CA807
            • %: ): +00+01+03+04+05+06+07+08+09+10+11+12+13+14,h1-01-02-03-04-05-06-08-09-11-12....js///0125200204206304400404443500625: `://::1???ACKADTASTAprAugBSTCATCDTCETCSTDSADecDltE: EATEDTEETEOFESTFebFriGETGMTGetHDTHSTHanI: IDTISTJSTJanJulJunKSTLaoMD4MD5MDTMSKMSTMa, xrefs: 005CA48F
            • ms cpu, not in [ runtime= s.limit= s.state= threads= unmarked wbuf1.n= wbuf2.n=%s %q: %s%s %x %x(unknown), newval=, oldval=, size = , tail = 244140625: status=AuthorityBassa_VahBhaiksukiClassINETCuneiformDiacriticExecQueryFindCloseForbiddenHex_DigitInherite, xrefs: 005CA79C
            • MB stacks, [recovered] allocCount found at *( gcscandone m->gsignal= maxTrigger= nDataRoots= nSpanRoots= pages/byte preemptoff= s.elemsize= s.sweepgen= span.limit= span.state= sysmonwait= wbuf1=<nil> wbuf2=<nil>) p->status=, cons/mark -byte limit100-cont, xrefs: 005CA848
            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID: (forced) -> node= B exp.) B work ( blocked= in use) lockedg= lockedm= m->curg= marked ms cpu, not in [ runtime= s.limit= s.state= threads= unmarked wbuf1.n= wbuf2.n=%s %q: %s%s %x %x(unknown), newval=, oldval=, size = , tail = 244140625: status=Authorit$ MB globals, MB) workers= called from flushedWork idlethreads= in duration in host name is nil, not nStackRoots= out of range pluginpath= s.spanclass= span.base()= syscalltick= work.nproc= work.nwait= , gp->status=, not pointer-byte block (3814697265625$ MB goal, flushGen gfreecnt= heapGoal= pages at ptrSize= runqsize= runqueue= s.base()= spinning= stopwait= stream=%d sweepgen sweepgen= targetpc= throwing= until pc=%!Weekday(%s|%s%s|%s, bound = , limit = .localhost/dev/stdin/etc/hosts12207031256103515625$ MB stacks, [recovered] allocCount found at *( gcscandone m->gsignal= maxTrigger= nDataRoots= nSpanRoots= pages/byte preemptoff= s.elemsize= s.sweepgen= span.limit= span.state= sysmonwait= wbuf1=<nil> wbuf2=<nil>) p->status=, cons/mark -byte limit100-cont$ MB, and cnt= got= max= ms, ptr tab= top=%s %q%s*%d%s=%s&#34;&#39;&amp;+0330+0430+0530+0545+0630+0845+1030+1245+1345, fp:-0930.avif.html.jpeg.json.wasm.webp1562578125:***@:path<nil>AdlamAprilBamumBatakBuhidCall ClassCountDograECDSAErrorFoundGreekHTTP/Khmer$ ms clock, nBSSRoots= p->status= s.nelems= schedtick= span.list= timerslen=) at entry+, elemsize=, npages = , settings:.WithCancel/dev/stderr/dev/stdout/index.html30517578125: frame.sp=BLAKE2b-256BLAKE2b-384BLAKE2b-512BLAKE2s-256Bad GatewayBad RequestClassHE$ ms cpu, not in [ runtime= s.limit= s.state= threads= unmarked wbuf1.n= wbuf2.n=%s %q: %s%s %x %x(unknown), newval=, oldval=, size = , tail = 244140625: status=AuthorityBassa_VahBhaiksukiClassINETCuneiformDiacriticExecQueryFindCloseForbiddenHex_DigitInherite$%: ): +00+01+03+04+05+06+07+08+09+10+11+12+13+14,h1-01-02-03-04-05-06-08-09-11-12....js///0125200204206304400404443500625: `://::1???ACKADTASTAprAugBSTCATCDTCETCSTDSADecDltE: EATEDTEETEOFESTFebFriGETGMTGetHDTHSTHanI: IDTISTJSTJanJulJunKSTLaoMD4MD5MDTMSKMSTMa$.$failed to set sweep barrierframe_pushpromise_pad_shortframe_rststream_zero_streamgcstopm: not waiting for gcgrowslice: len out of rangehkdf: entropy limit reachedhttp chunk length too largehttp2: response body closedinput overflows the modulusinsufficient secu$gc done but gcphase != _GCoffgfput: bad status (not Gdead)http2: client conn not usablehttp2: client connection losthttp: idle connection timeoutinteger not minimally-encodedinternal error: took too muchinvalid P256 element encodinginvalid character class rang$gcinggscanhchanhostshttpsimap2imap3imapsinet4inet6init int16int32int64matchmheapmonthntohspanicparsepop3srangerune scav schedsleepslicesockssse41sse42ssse3sudogsweeptext/tls: traceuint8usageutf-8write B -> FROM Value addr= alloc base code= ctxt: curg= free
            • API String ID: 0-3070744486
            • Opcode ID: 38c627055a7b00b8d3cb290d9b3bcede792e79f241e47d3b95588447c4b19c45
            • Instruction ID: 73aac9d047dadf6d183d77e87c0cf81b97582c0878a2d5af06c9fcf66c50690f
            • Opcode Fuzzy Hash: 38c627055a7b00b8d3cb290d9b3bcede792e79f241e47d3b95588447c4b19c45
            • Instruction Fuzzy Hash: D672BE36705BC5C9EB10DB25F8957AABB64F78AB80F848126DA8D43766DF3CC085C702
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1969 5da260-5da26c 1970 5dae19-5dae32 call 6133a0 1969->1970 1971 5da272-5da2ee 1969->1971 1970->1969 1972 5da311-5da315 1971->1972 1974 5da31b-5da365 1972->1974 1975 5da426-5da434 1972->1975 1977 5da36b-5da36e 1974->1977 1978 5dae10-5dae18 call 615a80 1974->1978 1979 5da43a-5da469 call 5dcec0 1975->1979 1980 5da6b0-5da6b8 call 615a20 1975->1980 1982 5dae08-5dae0b call 615ac0 1977->1982 1983 5da374-5da3e5 1977->1983 1978->1970 1994 5da46f-5da511 call 5da180 1979->1994 1995 5da512-5da52d 1979->1995 1986 5da6bd-5da6c3 1980->1986 1982->1978 1987 5da3e7-5da3ee 1983->1987 1988 5da3f0 1983->1988 1992 5da6cd-5da6d0 1986->1992 1993 5da3f3-5da421 1987->1993 1988->1993 1998 5da94e-5da951 1992->1998 1999 5da6d6 1992->1999 1993->1992 1996 5da6ab call 615a00 1995->1996 1997 5da533-5da560 1995->1997 1996->1980 2000 5da694-5da6a1 1997->2000 2001 5da566-5da575 1997->2001 2004 5dac0f-5dac80 call 5da180 1998->2004 2005 5da957-5da963 1998->2005 2002 5dadfd-5dae03 call 615a00 1999->2002 2003 5da6dc-5da6e3 1999->2003 2000->1996 2008 5da57b-5da680 call 5e82a0 call 5e8ba0 call 5e89a0 call 5e8ba0 call 5e89a0 call 5e8ba0 call 5e88a0 call 5e8ba0 call 5e88a0 call 5e8ba0 call 5e88a0 call 5e8ba0 call 5e8320 call 5e82a0 call 5e8ba0 call 5e88a0 call 5e8500 call 5e8320 call 5e6960 2001->2008 2009 5da685-5da68f 2001->2009 2002->1982 2010 5da6e9-5da7a3 2003->2010 2011 5da6e5-5da6e7 2003->2011 2013 5da969-5da996 2005->2013 2014 5dabf6-5dac0e 2005->2014 2008->2009 2026 5da7a9-5da7b6 2010->2026 2027 5da8eb-5da946 2010->2027 2011->1986 2019 5da998-5da9a0 2013->2019 2020 5da9a2-5da9be 2013->2020 2024 5da9c5-5da9cf 2019->2024 2020->2024 2028 5da9d9-5da9dd 2024->2028 2029 5da9d1-5da9d7 2024->2029 2031 5da7bf-5da7d0 2026->2031 2032 5da7b8-5da7bd 2026->2032 2027->1998 2033 5da9e4-5dad63 call 5e82a0 call 5e8ba0 call 5e89a0 call 5e8ba0 call 5e89a0 call 5e8ba0 call 5e88a0 call 5e8ba0 call 5e88a0 call 5e8ba0 call 5e88a0 call 5e8500 call 5e8320 call 5e82a0 call 5e8ba0 call 5e89a0 call 5e8ba0 call 5e88a0 call 5e8ba0 call 5e89a0 call 5e8500 call 5e8320 call 5e82a0 call 5e8ba0 call 5e8a00 call 5e8ba0 call 5e89a0 call 5e8500 call 5e8320 call 5e82a0 call 5e8ba0 call 5e88a0 call 5e8ba0 call 5e88a0 call 5e8500 call 5e8320 2028->2033 2029->2033 2036 5da7d3-5da7d6 2031->2036 2032->2036 2151 5dadec-5dadf8 call 5e6960 2033->2151 2152 5dad69-5dad9a 2033->2152 2039 5da7dc-5da7e3 2036->2039 2040 5da2f0-5da30e 2036->2040 2043 5da7e5-5da7ef 2039->2043 2044 5da7f1-5da80c 2039->2044 2040->1972 2049 5da817 2043->2049 2045 5da893-5da8e6 2044->2045 2046 5da812 2044->2046 2045->1986 2046->2049 2050 5da819-5da823 2049->2050 2051 5da825-5da830 2049->2051 2054 5da834-5da88e 2050->2054 2051->2054 2054->1986 2151->2002 2154 5dad9c-5dada2 2152->2154 2155 5dada4-5dadbc 2152->2155 2156 5dadbf-5dadd1 2154->2156 2155->2156 2157 5daddd-5dade1 2156->2157 2158 5dadd3-5dadd8 2156->2158 2157->2151
            Strings
            • runtime: p.searchAddr = span has no free objectsstack trace unavailablestreamSafe was not resetstructure needs cleaningtext/html; charset=utf-8unexpected buffer len=%vunpacking Question.Classupdate during transitionwmi: invalid entity typex509: malformed vali, xrefs: 005DAB25
            • , levelBits[level] = 186264514923095703125931322574615478515625AdjustTokenPrivilegesAlaskan Standard TimeAnatolian_HieroglyphsArabian Standard TimeBelarus Standard TimeCM_Get_DevNode_StatusCentral Standard TimeChangeServiceConfig2WDeregisterEventSourceDwmGetWi, xrefs: 005DABC5
            • ] = ] n=allgallpasn1avx2basebindbitsbmi1bmi2boolcallcap cas1cas2cas3cas4cas5cas6chancx16datedeaddialermsetagfailfilefromftpsfuncgziphosthourhttpicmpidleigmpinetint8itabkindlinkopenpipepop3quitreadrootsbrksmtpsse2sse3tcp4tcp6trueudp4udp6uintunixvaryxn-- ... MB, xrefs: 005DAA2F
            • bad summary databad symbol tablecastogscanstatuscontent-encodingcontent-languagecontent-locationcontext canceleddivision by zerogc: unswept spangcshrinkstackoffhost unreachablehostLookupOrder=integer overflowinvalid argumentinvalid encodinginvalid exchangeinva, xrefs: 005DA66F, 005DADEC
            • , npages = , settings:.WithCancel/dev/stderr/dev/stdout/index.html30517578125: frame.sp=BLAKE2b-256BLAKE2b-384BLAKE2b-512BLAKE2s-256Bad GatewayBad RequestClassHESIODCloseHandleCoGetObjectCreateFileWDeleteFileWDives_AkuruENABLE_PUSHEND_HEADERSESTABLISHEDEarly H, xrefs: 005DAABC
            • runtime: npages = runtime: range = {runtime: textAddr segmentation faultsequence truncatedserver misbehavingstopping the worldstreams pipe errorsync.RWMutex.RLocksystem page size (tracebackancestorstruncated sequenceunexpected messageuse of closed filevalue ou, xrefs: 005DA645
            • runtime: levelShift[level] = runtime: marking free object runtime: p.gcMarkWorkerMode= runtime: split stack overflowruntime: sudog with non-nil cruntime: summary max pages = runtime: traceback stuck. pc=scanobject of a noscan objectsemacquire not on the G stac, xrefs: 005DABA5
            • runtime: level = runtime: nameOff runtime: pointer runtime: summary[runtime: textOff runtime: typeOff scanobject n == 0seeker can't seekselect (no cases)stack: frame={sp:swept cached spansync.RWMutex.Lockthread exhaustiontransfer-encodingtruncated headersunkno, xrefs: 005DAA9E
            • , i = , not , val .local.onion390625<-chanAcceptAnswerArabicAugustBasic BrahmiCANCELCLOSEDCarianChakmaCommonCookieCopticDELETEExpectFormatFridayGOAWAYGetACPGothicHangulHatranHebrewHyphenKaithiKhojkiLISTENLengthLepchaLockedLycianLydianMondayPADDEDPragmaRejangSC, xrefs: 005DAB45
            • , j0 = 19531252.5.4.32.5.4.52.5.4.62.5.4.72.5.4.82.5.4.99765625: type ::ffff::method:scheme:statusAvestanBengaliBrailleCLOSINGCONNECTChanDirCopySidCreatedCypriotDeseretEd25519ElbasanElymaicExpiresFreeSidGODEBUGGranthaHEADERSHanunooIM UsedIO waitInstAltInstNopJ, xrefs: 005DAADA
            • runtime: summary[runtime: textOff runtime: typeOff scanobject n == 0seeker can't seekselect (no cases)stack: frame={sp:swept cached spansync.RWMutex.Lockthread exhaustiontransfer-encodingtruncated headersunknown caller pcunknown type kindunrecognized namewait , xrefs: 005DA58A, 005DA9EE
            • ] = (allowarraybad nchdirclosecpu%ddeferfalsefaultfilesgcinggscanhchanhostshttpsimap2imap3imapsinet4inet6init int16int32int64matchmheapmonthntohspanicparsepop3srangerune scav schedsleepslicesockssse41sse42ssse3sudogsweeptext/tls: traceuint8usageutf-8write B ->, xrefs: 005DA5C5
            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID: , i = , not , val .local.onion390625<-chanAcceptAnswerArabicAugustBasic BrahmiCANCELCLOSEDCarianChakmaCommonCookieCopticDELETEExpectFormatFridayGOAWAYGetACPGothicHangulHatranHebrewHyphenKaithiKhojkiLISTENLengthLepchaLockedLycianLydianMondayPADDEDPragmaRejangSC$, j0 = 19531252.5.4.32.5.4.52.5.4.62.5.4.72.5.4.82.5.4.99765625: type ::ffff::method:scheme:statusAvestanBengaliBrailleCLOSINGCONNECTChanDirCopySidCreatedCypriotDeseretEd25519ElbasanElymaicExpiresFreeSidGODEBUGGranthaHEADERSHanunooIM UsedIO waitInstAltInstNopJ$, levelBits[level] = 186264514923095703125931322574615478515625AdjustTokenPrivilegesAlaskan Standard TimeAnatolian_HieroglyphsArabian Standard TimeBelarus Standard TimeCM_Get_DevNode_StatusCentral Standard TimeChangeServiceConfig2WDeregisterEventSourceDwmGetWi$, npages = , settings:.WithCancel/dev/stderr/dev/stdout/index.html30517578125: frame.sp=BLAKE2b-256BLAKE2b-384BLAKE2b-512BLAKE2s-256Bad GatewayBad RequestClassHESIODCloseHandleCoGetObjectCreateFileWDeleteFileWDives_AkuruENABLE_PUSHEND_HEADERSESTABLISHEDEarly H$] = (allowarraybad nchdirclosecpu%ddeferfalsefaultfilesgcinggscanhchanhostshttpsimap2imap3imapsinet4inet6init int16int32int64matchmheapmonthntohspanicparsepop3srangerune scav schedsleepslicesockssse41sse42ssse3sudogsweeptext/tls: traceuint8usageutf-8write B ->$] = ] n=allgallpasn1avx2basebindbitsbmi1bmi2boolcallcap cas1cas2cas3cas4cas5cas6chancx16datedeaddialermsetagfailfilefromftpsfuncgziphosthourhttpicmpidleigmpinetint8itabkindlinkopenpipepop3quitreadrootsbrksmtpsse2sse3tcp4tcp6trueudp4udp6uintunixvaryxn-- ... MB$bad summary databad symbol tablecastogscanstatuscontent-encodingcontent-languagecontent-locationcontext canceleddivision by zerogc: unswept spangcshrinkstackoffhost unreachablehostLookupOrder=integer overflowinvalid argumentinvalid encodinginvalid exchangeinva$runtime: level = runtime: nameOff runtime: pointer runtime: summary[runtime: textOff runtime: typeOff scanobject n == 0seeker can't seekselect (no cases)stack: frame={sp:swept cached spansync.RWMutex.Lockthread exhaustiontransfer-encodingtruncated headersunkno$runtime: levelShift[level] = runtime: marking free object runtime: p.gcMarkWorkerMode= runtime: split stack overflowruntime: sudog with non-nil cruntime: summary max pages = runtime: traceback stuck. pc=scanobject of a noscan objectsemacquire not on the G stac$runtime: npages = runtime: range = {runtime: textAddr segmentation faultsequence truncatedserver misbehavingstopping the worldstreams pipe errorsync.RWMutex.RLocksystem page size (tracebackancestorstruncated sequenceunexpected messageuse of closed filevalue ou$runtime: p.searchAddr = span has no free objectsstack trace unavailablestreamSafe was not resetstructure needs cleaningtext/html; charset=utf-8unexpected buffer len=%vunpacking Question.Classupdate during transitionwmi: invalid entity typex509: malformed vali$runtime: summary[runtime: textOff runtime: typeOff scanobject n == 0seeker can't seekselect (no cases)stack: frame={sp:swept cached spansync.RWMutex.Lockthread exhaustiontransfer-encodingtruncated headersunknown caller pcunknown type kindunrecognized namewait
            • API String ID: 0-1438732543
            • Opcode ID: 59aac260e6a34c837cc01c283fa1670ea3fbfaf90196f0b2d2f2e155c599897f
            • Instruction ID: a6117eaabe184ab2a416be23450eca35fe357f80df3f80e11ad7905f818b691e
            • Opcode Fuzzy Hash: 59aac260e6a34c837cc01c283fa1670ea3fbfaf90196f0b2d2f2e155c599897f
            • Instruction Fuzzy Hash: B632CF76B14BC5C2DB24AB16E8413EAAB65F789BC0F848563DE8D17B5ACF38C445C701
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2159 5bc4a0-5bc4a9 2160 5bc4af-5bc503 2159->2160 2161 5bcc26-5bcc53 call 6133a0 2159->2161 2163 5bc50c-5bc52a call 5be0e0 2160->2163 2164 5bc505-5bc507 2160->2164 2161->2159 2173 5bc52c-5bc54c 2163->2173 2174 5bc551 2163->2174 2166 5bc8d6-5bc8e3 2164->2166 2169 5bc9f9-5bca08 2166->2169 2170 5bc8e9-5bc90a 2166->2170 2175 5bca0b-5bca0e 2169->2175 2171 5bc91b-5bc934 2170->2171 2172 5bc90c-5bc919 2170->2172 2177 5bc93b-5bc97e call 5c7b80 2171->2177 2178 5bc936-5bc939 2171->2178 2176 5bc986-5bc98c 2172->2176 2173->2166 2179 5bc556-5bc5c3 2174->2179 2180 5bcace-5bcad8 2175->2180 2181 5bca14-5bca28 call 5bcc60 2175->2181 2183 5bc98e-5bc991 2176->2183 2184 5bc9e5-5bc9f7 2176->2184 2177->2176 2178->2176 2189 5bc5c9-5bc5d4 2179->2189 2190 5bc825-5bc83a 2179->2190 2185 5bcada-5bcaf1 2180->2185 2186 5bcaf3-5bcb0c 2180->2186 2200 5bca2e-5bcacb call 5c8d20 * 2 2181->2200 2201 5bcb66-5bcb79 2181->2201 2193 5bc997-5bc9e0 call 5c7a40 2183->2193 2194 5bc8a5-5bc8d3 2183->2194 2184->2175 2195 5bcb4d-5bcb50 2185->2195 2196 5bcb0e-5bcb1b 2186->2196 2197 5bcb1d-5bcb49 2186->2197 2198 5bc5da-5bc5f5 2189->2198 2199 5bc896-5bc8a0 call 615a20 2189->2199 2193->2194 2194->2166 2203 5bcb8b-5bcc25 call 5e82a0 call 5e8ba0 call 5e8a00 call 5e8ba0 call 5e8a00 call 5e8ba0 * 2 call 5e8500 call 5e8320 call 5e6960 2195->2203 2204 5bcb52-5bcb59 2195->2204 2196->2195 2197->2195 2205 5bc5fb-5bc652 call 5e3be0 2198->2205 2206 5bc68a-5bc6a3 2198->2206 2199->2194 2200->2180 2203->2161 2211 5bcb5b-5bcb61 2204->2211 2212 5bcb7a-5bcb86 call 5e6960 2204->2212 2224 5bc658-5bc680 2205->2224 2225 5bc885-5bc891 call 5e6960 2205->2225 2217 5bc6a9-5bc6d4 call 5be0e0 2206->2217 2218 5bc870-5bc880 call 5e6960 2206->2218 2211->2179 2212->2203 2231 5bc6d6-5bc6ef call 5bdd00 2217->2231 2232 5bc6f5-5bc703 2217->2232 2218->2225 2224->2206 2225->2199 2231->2232 2246 5bc85f-5bc86b call 5e6960 2231->2246 2235 5bc709-5bc727 2232->2235 2236 5bc813-5bc81b 2232->2236 2239 5bc72d-5bc739 2235->2239 2240 5bc7d6-5bc7eb 2235->2240 2236->2190 2241 5bc73b 2239->2241 2242 5bc742-5bc763 call 5bdd00 2239->2242 2244 5bc7ed-5bc803 2240->2244 2245 5bc846-5bc849 call 615a80 2240->2245 2241->2242 2255 5bc84e-5bc85a call 5e6960 2242->2255 2257 5bc769-5bc7ae 2242->2257 2251 5bc83b-5bc841 call 615a00 2244->2251 2252 5bc805-5bc80e 2244->2252 2245->2255 2246->2218 2251->2245 2255->2246 2260 5bc7c1-5bc7ce 2257->2260 2261 5bc7b0-5bc7b9 call 6163a0 2257->2261 2260->2240 2261->2260
            Strings
            • arena already initializedbad status in shrinkstackbad system huge page sizechansend: spurious wakeupcheckdead: no m for timercheckdead: no p for timercontext deadline exceededexplicit tag has no childframe_data_pad_byte_shortframe_headers_pad_too_bigframe_head, xrefs: 005BC870
            • misrounded allocation in sysAllocnet/http: skip alternate protocolpad size larger than data payloadpseudo header field after regularreflect.nameFrom: name too long: reflect: Field index out of rangereflect: NumOut of non-func type reflect: array index out of r, xrefs: 005BCB7A
            • base outside usable address spacebytes.Buffer.Grow: negative countconcurrent map read and map writeconnection not allowed by rulesetcrypto/aes: output not full blockcrypto/des: output not full blockcrypto: requested hash function #findrunnable: negative nmspin, xrefs: 005BCB14
            • end outside usable address spaceframe_windowupdate_zero_inc_conngo package net: hostLookupOrder(integer is not minimally encodedinvalid limiter event type foundinvalid range: failed to overlapmime: expected token after slashnumerical argument out of domainpani, xrefs: 005BCB42
            • region exceeds uintptr rangeruntime.semasleep unexpectedruntime: bad lfnode address runtime: casgstatus: oldval=runtime: no module data for save on system g not allowedthe service is not installedunexpected protocol version x509: invalid DSA parametersx509: in, xrefs: 005BCAEA
            • out of memory allocating heap arena mapruntime: blocked write on free polldescruntime: casfrom_Gscanstatus failed gp=stack growth not allowed in system callsuspendG from non-preemptible goroutinetags don't match (%d vs %+v) %+v %s @%dtls: internal error: wrong, xrefs: 005BC885
            • ) not in usable address space: ...additional frames elided....lib section in a.out corrupted11368683772161602973937988281255684341886080801486968994140625CLIENT_HANDSHAKE_TRAFFIC_SECRETCentral Brazilian Standard TimeCertDuplicateCertificateContextMountain Sta, xrefs: 005BCBE5
            • out of memory allocating heap arena metadatareflect: funcLayout with interface receiver runtime: lfstack.push invalid packing: node=span on userArena.faultList has invalid sizetls: server sent an incorrect legacy versiontls: server's Finished message was incor, xrefs: 005BC85F
            • , xrefs: 005BCB32
            • out of memory allocating allArenasreflect.Value.Grow: slice overflowreflect: ChanDir of non-chan type reflect: Field index out of boundsreflect: Field of non-struct type reflect: string index out of rangeruntime.SetFinalizer: cannot pass runtime: g is running , xrefs: 005BC84E
            • runtime: memory allocated by OS [runtime: name offset out of rangeruntime: text offset out of rangeruntime: type offset out of rangescalar has high bit set illegallyskip everything and stop the walkslice bounds out of range [%x:%y]stackalloc not on scheduler s, xrefs: 005BCBA5
            • memory reservation exceeds address space limitnet/http: internal error: misuse of tryDelivernet/http: too many 1xx informational responsesos: unexpected result from WaitForSingleObjectpanicwrap: unexpected string after type name: protocol error: received DATA , xrefs: 005BCC0F
            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID: $) not in usable address space: ...additional frames elided....lib section in a.out corrupted11368683772161602973937988281255684341886080801486968994140625CLIENT_HANDSHAKE_TRAFFIC_SECRETCentral Brazilian Standard TimeCertDuplicateCertificateContextMountain Sta$arena already initializedbad status in shrinkstackbad system huge page sizechansend: spurious wakeupcheckdead: no m for timercheckdead: no p for timercontext deadline exceededexplicit tag has no childframe_data_pad_byte_shortframe_headers_pad_too_bigframe_head$base outside usable address spacebytes.Buffer.Grow: negative countconcurrent map read and map writeconnection not allowed by rulesetcrypto/aes: output not full blockcrypto/des: output not full blockcrypto: requested hash function #findrunnable: negative nmspin$end outside usable address spaceframe_windowupdate_zero_inc_conngo package net: hostLookupOrder(integer is not minimally encodedinvalid limiter event type foundinvalid range: failed to overlapmime: expected token after slashnumerical argument out of domainpani$memory reservation exceeds address space limitnet/http: internal error: misuse of tryDelivernet/http: too many 1xx informational responsesos: unexpected result from WaitForSingleObjectpanicwrap: unexpected string after type name: protocol error: received DATA $misrounded allocation in sysAllocnet/http: skip alternate protocolpad size larger than data payloadpseudo header field after regularreflect.nameFrom: name too long: reflect: Field index out of rangereflect: NumOut of non-func type reflect: array index out of r$out of memory allocating allArenasreflect.Value.Grow: slice overflowreflect: ChanDir of non-chan type reflect: Field index out of boundsreflect: Field of non-struct type reflect: string index out of rangeruntime.SetFinalizer: cannot pass runtime: g is running $out of memory allocating heap arena mapruntime: blocked write on free polldescruntime: casfrom_Gscanstatus failed gp=stack growth not allowed in system callsuspendG from non-preemptible goroutinetags don't match (%d vs %+v) %+v %s @%dtls: internal error: wrong$out of memory allocating heap arena metadatareflect: funcLayout with interface receiver runtime: lfstack.push invalid packing: node=span on userArena.faultList has invalid sizetls: server sent an incorrect legacy versiontls: server's Finished message was incor$region exceeds uintptr rangeruntime.semasleep unexpectedruntime: bad lfnode address runtime: casgstatus: oldval=runtime: no module data for save on system g not allowedthe service is not installedunexpected protocol version x509: invalid DSA parametersx509: in$runtime: memory allocated by OS [runtime: name offset out of rangeruntime: text offset out of rangeruntime: type offset out of rangescalar has high bit set illegallyskip everything and stop the walkslice bounds out of range [%x:%y]stackalloc not on scheduler s
            • API String ID: 0-2469717192
            • Opcode ID: af5e0b4e92e57198cd08b550ef965f54dc05a955317c5ffcf8a16b12f20879ba
            • Instruction ID: b0b91e458468c88e6f8eeaeb1875c8c9a133e1040434954b3053845c9c24845d
            • Opcode Fuzzy Hash: af5e0b4e92e57198cd08b550ef965f54dc05a955317c5ffcf8a16b12f20879ba
            • Instruction Fuzzy Hash: A0027B72609BC4C2DB64CB56E4503EABB65F38AB90F448226EEDD53799CF38D544C704
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            • missing stackmapno colon on lineno renegotiationno route to hostnon-Go functionnon-IPv4 addressnon-IPv6 addressobject is remoteproxy-connectionread_frame_otherreflect mismatchregexp: Compile(remote I/O errorruntime: addr = runtime: base = runtime: head = runt, xrefs: 005FDF6F, 005FE0DC
            • untyped locals %s %s HTTP/1.1, not a function.WithValue(type /etc/resolv.conf0123456789ABCDEF0123456789abcdef2384185791015625: value of type Already ReportedCoCreateInstanceConnectNamedPipeContent-EncodingContent-LanguageContent-Length: CreateDirectoryWCrea, xrefs: 005FE094
            • bad symbol tablecastogscanstatuscontent-encodingcontent-languagecontent-locationcontext canceleddivision by zerogc: unswept spangcshrinkstackoffhost unreachablehostLookupOrder=integer overflowinvalid argumentinvalid encodinginvalid exchangeinvalid g statusleng, xrefs: 005FDECA, 005FE03B
            • args stack map entries for registry key already exists18189894035458564758300781259094947017729282379150390625Aus Central W. Standard TimeCanada Central Standard TimeCen. Australia Standard TimeCentral Europe Standard TimeCertCreateCertificateContextEd25519 , xrefs: 005FDE6F
            • locals stack map entries for 227373675443232059478759765625Central European Standard TimeCentral Standard Time (Mexico)CertDeleteCertificateFromStoreConfig.Name field is required.E. South America Standard TimeEastern Standard Time (Mexico)GODEBUG: unknown cpu, xrefs: 005FDFE5
            • runtime: pcdata is runtime: preempt g0semaRoot rotateLeftskip this directorystopm holding lockssync.Cond is copiedsysMemStat overflowtime: unknown unit too many open filesunexpected InstFailunexpected g statusunknown Go type: %vunknown certificateunknown ciphe, xrefs: 005FDE31, 005FDFA9
            • untyped args -thread limit.WithDeadline(1907348632812595367431640625: extra text: <not Stringer>Accept-CharsetCertCloseStoreCoInitializeExCoUninitializeComputerNameExContent-LengthControlServiceCreateEventExWCreateMutexExWCreateProcessWCreateServiceWCryptGen, xrefs: 005FDF26
            • runtime: frame runtime: max = runtime: min = runtimer: bad pscan missed a gstartm: m has pstopm holding psync.Mutex.LocktimeBeginPeriodtraceback stuckunexpected typeunknown Go typeunknown networkunknown versionwindows-servicewrite error: %wx-forwarded-for alre, xrefs: 005FDF06, 005FE074
            • (targetpc= , plugin: ErrCode=%v KiB work, exp.) for freeindex= gcwaiting= idleprocs= in status mallocing= ms clock, nBSSRoots= p->status= s.nelems= schedtick= span.list= timerslen=) at entry+, elemsize=, npages = , settings:.WithCancel/dev/stderr/dev/st, xrefs: 005FDE94, 005FE005
            • and cnt= got= max= ms, ptr tab= top=%s %q%s*%d%s=%s&#34;&#39;&amp;+0330+0430+0530+0545+0630+0845+1030+1245+1345, fp:-0930.avif.html.jpeg.json.wasm.webp1562578125:***@:path<nil>AdlamAprilBamumBatakBuhidCall ClassCountDograECDSAErrorFoundGreekHTTP/KhmerLatin, xrefs: 005FDE51, 005FDFC6
            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID: (targetpc= , plugin: ErrCode=%v KiB work, exp.) for freeindex= gcwaiting= idleprocs= in status mallocing= ms clock, nBSSRoots= p->status= s.nelems= schedtick= span.list= timerslen=) at entry+, elemsize=, npages = , settings:.WithCancel/dev/stderr/dev/st$ and cnt= got= max= ms, ptr tab= top=%s %q%s*%d%s=%s&#34;&#39;&amp;+0330+0430+0530+0545+0630+0845+1030+1245+1345, fp:-0930.avif.html.jpeg.json.wasm.webp1562578125:***@:path<nil>AdlamAprilBamumBatakBuhidCall ClassCountDograECDSAErrorFoundGreekHTTP/KhmerLatin$ args stack map entries for registry key already exists18189894035458564758300781259094947017729282379150390625Aus Central W. Standard TimeCanada Central Standard TimeCen. Australia Standard TimeCentral Europe Standard TimeCertCreateCertificateContextEd25519 $ locals stack map entries for 227373675443232059478759765625Central European Standard TimeCentral Standard Time (Mexico)CertDeleteCertificateFromStoreConfig.Name field is required.E. South America Standard TimeEastern Standard Time (Mexico)GODEBUG: unknown cpu$ untyped args -thread limit.WithDeadline(1907348632812595367431640625: extra text: <not Stringer>Accept-CharsetCertCloseStoreCoInitializeExCoUninitializeComputerNameExContent-LengthControlServiceCreateEventExWCreateMutexExWCreateProcessWCreateServiceWCryptGen$ untyped locals %s %s HTTP/1.1, not a function.WithValue(type /etc/resolv.conf0123456789ABCDEF0123456789abcdef2384185791015625: value of type Already ReportedCoCreateInstanceConnectNamedPipeContent-EncodingContent-LanguageContent-Length: CreateDirectoryWCrea$bad symbol tablecastogscanstatuscontent-encodingcontent-languagecontent-locationcontext canceleddivision by zerogc: unswept spangcshrinkstackoffhost unreachablehostLookupOrder=integer overflowinvalid argumentinvalid encodinginvalid exchangeinvalid g statusleng$missing stackmapno colon on lineno renegotiationno route to hostnon-Go functionnon-IPv4 addressnon-IPv6 addressobject is remoteproxy-connectionread_frame_otherreflect mismatchregexp: Compile(remote I/O errorruntime: addr = runtime: base = runtime: head = runt$runtime: frame runtime: max = runtime: min = runtimer: bad pscan missed a gstartm: m has pstopm holding psync.Mutex.LocktimeBeginPeriodtraceback stuckunexpected typeunknown Go typeunknown networkunknown versionwindows-servicewrite error: %wx-forwarded-for alre$runtime: pcdata is runtime: preempt g0semaRoot rotateLeftskip this directorystopm holding lockssync.Cond is copiedsysMemStat overflowtime: unknown unit too many open filesunexpected InstFailunexpected g statusunknown Go type: %vunknown certificateunknown ciphe
            • API String ID: 0-2336858285
            • Opcode ID: 2345bf7fb2e756a0fe3ee676eca2628bd9ebf3190a6879e2f84bea46289e68ca
            • Instruction ID: 5e29a11c4d698416a6462dcbef9db90b721c7dc9111f315b4acb356743390c2b
            • Opcode Fuzzy Hash: 2345bf7fb2e756a0fe3ee676eca2628bd9ebf3190a6879e2f84bea46289e68ca
            • Instruction Fuzzy Hash: E2F19C76614B85C6D724EF26E8843AABB65F789B80F948022EBCD47766DF38C445CB10
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            • malloc deadlockmisaligned maskmissing addressmissing mcache?ms: gomaxprocs=network is downno medium foundno such processnon-minimal tagpreempt SPWRITErecord overflowrecovery failedrecv_rststream_runtime error: runtime: frame runtime: max = runtime: min = runti, xrefs: 005BD7E5
            • mallocgc called with gcphase == _GCmarkterminationnet/http: HTTP/1.x transport connection broken: %wnet/http: Transport failed to read from server: %vnet/http: cannot rewind body after connection lossrecursive call during initialization - linker skewruntime: u, xrefs: 005BD7F6
            • malloc during signalno such struct fieldnot an integer classnotetsleep not on g0number has no digitsp mcache not flushedpacer: assist ratio=pad length too largepreempt off reason: read_frame_too_largereflect.Value.SetIntreflect.makeFuncStubruntime: double wait, xrefs: 005BD7D0
            • !"#$%%&&''((()))*++,,,,,------....//////0001123333333333444444444455666677777888888888889999999999::::::;;;;;;;;;;;;;;;;<<<<<<<<<<<<<<<<=====>>>>>>>>>>>??????????@@@@@@@@@@@@@@@@@@@@@@AAAAAAAAAAAAAAAAAAAAABBBBBBBBBBBCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC, xrefs: 005BD33A
            • mallocgc called without a P or outside bootstrappingprotocol error: received DATA before a HEADERS frameruntime.SetFinalizer: pointer not in allocated blockruntime: GetQueuedCompletionStatusEx failed (errno= runtime: use of FixAlloc_Alloc before FixAlloc_Init, xrefs: 005BD7BF
            • delayed zeroing on data that may contain pointersecdsa: internal error: truncated hash is too longfully empty unfreed span set block found in resethttp2: request body closed due to handler exitinghttp: wrote more than the declared Content-Lengthinvalid memory , xrefs: 005BD777
            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID: !"#$%%&&''((()))*++,,,,,------....//////0001123333333333444444444455666677777888888888889999999999::::::;;;;;;;;;;;;;;;;<<<<<<<<<<<<<<<<=====>>>>>>>>>>>??????????@@@@@@@@@@@@@@@@@@@@@@AAAAAAAAAAAAAAAAAAAAABBBBBBBBBBBCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC$delayed zeroing on data that may contain pointersecdsa: internal error: truncated hash is too longfully empty unfreed span set block found in resethttp2: request body closed due to handler exitinghttp: wrote more than the declared Content-Lengthinvalid memory $malloc deadlockmisaligned maskmissing addressmissing mcache?ms: gomaxprocs=network is downno medium foundno such processnon-minimal tagpreempt SPWRITErecord overflowrecovery failedrecv_rststream_runtime error: runtime: frame runtime: max = runtime: min = runti$malloc during signalno such struct fieldnot an integer classnotetsleep not on g0number has no digitsp mcache not flushedpacer: assist ratio=pad length too largepreempt off reason: read_frame_too_largereflect.Value.SetIntreflect.makeFuncStubruntime: double wait$mallocgc called with gcphase == _GCmarkterminationnet/http: HTTP/1.x transport connection broken: %wnet/http: Transport failed to read from server: %vnet/http: cannot rewind body after connection lossrecursive call during initialization - linker skewruntime: u$mallocgc called without a P or outside bootstrappingprotocol error: received DATA before a HEADERS frameruntime.SetFinalizer: pointer not in allocated blockruntime: GetQueuedCompletionStatusEx failed (errno= runtime: use of FixAlloc_Alloc before FixAlloc_Init
            • API String ID: 0-221902859
            • Opcode ID: c9a7511c892fee2fea4e03323fbb20b55c89b57664c17fe7575393e9e64af13b
            • Instruction ID: 233a34a96a4e46a3c1a945516b244446156fb365c3d5331d948f4dad62295fc2
            • Opcode Fuzzy Hash: c9a7511c892fee2fea4e03323fbb20b55c89b57664c17fe7575393e9e64af13b
            • Instruction Fuzzy Hash: 1B22DE76219B8482DB10DF15E0407EABB71F389BD4F585526EE8D07B99EF38D884CB10
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            • invalid g statuslength too largemSpanList.insertmSpanList.removemessage too longmissing stackmapno colon on lineno renegotiationno route to hostnon-Go functionnon-IPv4 addressnon-IPv6 addressobject is remoteproxy-connectionread_frame_otherreflect mismatchrege, xrefs: 005E7A1A
            • runtime: gp: gp=runtime: getg: g=runtime: npages = runtime: range = {runtime: textAddr segmentation faultsequence truncatedserver misbehavingstopping the worldstreams pipe errorsync.RWMutex.RLocksystem page size (tracebackancestorstruncated sequenceunexpect, xrefs: 005E7927
            • , gp->atomicstatus=14901161193847656252006-01-02 15:04:0520060102150405Z07007450580596923828125Altai Standard TimeBahia Standard TimeCanadian_AboriginalChina Standard TimeConnection: closeCreatePseudoConsoleCreateSymbolicLinkWCryptReleaseContextEgypt Standar, xrefs: 005E7965
            • , goid=, j0 = 19531252.5.4.32.5.4.52.5.4.62.5.4.72.5.4.82.5.4.99765625: type ::ffff::method:scheme:statusAvestanBengaliBrailleCLOSINGCONNECTChanDirCopySidCreatedCypriotDeseretEd25519ElbasanElymaicExpiresFreeSidGODEBUGGranthaHEADERSHanunooIM UsedIO waitInstAltI, xrefs: 005E7945, 005E79CF
            • , g->atomicstatus=, gp->atomicstatus=14901161193847656252006-01-02 15:04:0520060102150405Z07007450580596923828125Altai Standard TimeBahia Standard TimeCanadian_AboriginalChina Standard TimeConnection: closeCreatePseudoConsoleCreateSymbolicLinkWCryptReleaseC, xrefs: 005E79EF
            • suspendG from non-preemptible goroutinetags don't match (%d vs %+v) %+v %s @%dtls: internal error: wrong nonce lengthtls: unsupported certificate curve (%s)traceback: unexpected SPWRITE function trailing backslash at end of expressiontransport endpoint is alre, xrefs: 005E7A2B
            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID: , g->atomicstatus=, gp->atomicstatus=14901161193847656252006-01-02 15:04:0520060102150405Z07007450580596923828125Altai Standard TimeBahia Standard TimeCanadian_AboriginalChina Standard TimeConnection: closeCreatePseudoConsoleCreateSymbolicLinkWCryptReleaseC$, goid=, j0 = 19531252.5.4.32.5.4.52.5.4.62.5.4.72.5.4.82.5.4.99765625: type ::ffff::method:scheme:statusAvestanBengaliBrailleCLOSINGCONNECTChanDirCopySidCreatedCypriotDeseretEd25519ElbasanElymaicExpiresFreeSidGODEBUGGranthaHEADERSHanunooIM UsedIO waitInstAltI$, gp->atomicstatus=14901161193847656252006-01-02 15:04:0520060102150405Z07007450580596923828125Altai Standard TimeBahia Standard TimeCanadian_AboriginalChina Standard TimeConnection: closeCreatePseudoConsoleCreateSymbolicLinkWCryptReleaseContextEgypt Standar$invalid g statuslength too largemSpanList.insertmSpanList.removemessage too longmissing stackmapno colon on lineno renegotiationno route to hostnon-Go functionnon-IPv4 addressnon-IPv6 addressobject is remoteproxy-connectionread_frame_otherreflect mismatchrege$runtime: gp: gp=runtime: getg: g=runtime: npages = runtime: range = {runtime: textAddr segmentation faultsequence truncatedserver misbehavingstopping the worldstreams pipe errorsync.RWMutex.RLocksystem page size (tracebackancestorstruncated sequenceunexpect$suspendG from non-preemptible goroutinetags don't match (%d vs %+v) %+v %s @%dtls: internal error: wrong nonce lengthtls: unsupported certificate curve (%s)traceback: unexpected SPWRITE function trailing backslash at end of expressiontransport endpoint is alre
            • API String ID: 0-2853955614
            • Opcode ID: e33320787c70009291d594b29f0906ae05be1e4eb3e549159c996124c6362d05
            • Instruction ID: 90699776e3f004ab2a11f396bc39a002d87c3871c66e9ba94550903370437896
            • Opcode Fuzzy Hash: e33320787c70009291d594b29f0906ae05be1e4eb3e549159c996124c6362d05
            • Instruction Fuzzy Hash: ECD13A76608BC4C6D718DB26E48576ABF61F38AB80F549166EEDD07B6ADF38C441CB00
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            • findrunnable: netpoll with pforgetting unknown stream idfound pointer to free objectgcBgMarkWorker: mode not setgcstopm: negative nmspinninggeneral SOCKS server failurehttp2: Transport received %shttp2: client conn is closedhttp: no Host in request URLinvalid , xrefs: 005EE9C5
            • findrunnable: negative nmspinningframe_pushpromise_promiseid_shortfreeing stack not in a stack spango package net: confVal.netCgo = http2: invalid pseudo headers: %vhttp2: recursive push not allowedhttp: CloseIdleConnections calledhttp: invalid Read on closed , xrefs: 005EE9D6
            • findrunnable: netpoll with spinningflate: corrupt input before offset greyobject: obj not pointer-alignedhpack: invalid Huffman-encoded datahttp: server closed idle connectionmheap.freeSpanLocked - invalid freemime: bogus characters after %%: %qmime: invalid R, xrefs: 005EE9AF
            • findrunnable: wrong pframe_ping_has_streamhttp: Handler timeouthttp: nil Request.URLinvalid NumericStringinvalid named captureinvalid scalar lengthkey is not comparablelink has been severedlocalhost.localdomainnegative shift amountnet/http: nil Contextpackage , xrefs: 005EE9E7
            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID: findrunnable: negative nmspinningframe_pushpromise_promiseid_shortfreeing stack not in a stack spango package net: confVal.netCgo = http2: invalid pseudo headers: %vhttp2: recursive push not allowedhttp: CloseIdleConnections calledhttp: invalid Read on closed $findrunnable: netpoll with pforgetting unknown stream idfound pointer to free objectgcBgMarkWorker: mode not setgcstopm: negative nmspinninggeneral SOCKS server failurehttp2: Transport received %shttp2: client conn is closedhttp: no Host in request URLinvalid $findrunnable: netpoll with spinningflate: corrupt input before offset greyobject: obj not pointer-alignedhpack: invalid Huffman-encoded datahttp: server closed idle connectionmheap.freeSpanLocked - invalid freemime: bogus characters after %%: %qmime: invalid R$findrunnable: wrong pframe_ping_has_streamhttp: Handler timeouthttp: nil Request.URLinvalid NumericStringinvalid named captureinvalid scalar lengthkey is not comparablelink has been severedlocalhost.localdomainnegative shift amountnet/http: nil Contextpackage
            • API String ID: 0-1858637327
            • Opcode ID: 43c68ba625984928046dfb3b92c865b8dc06368e60e3d04987fd65d271e9d88b
            • Instruction ID: 62c5656401933af63ba565a7e9afbcd16f916531aea619f582151f1d04e66289
            • Opcode Fuzzy Hash: 43c68ba625984928046dfb3b92c865b8dc06368e60e3d04987fd65d271e9d88b
            • Instruction Fuzzy Hash: 9752CC32609BC1C5EB28CF26E4853AABB61F785B80F484426DACD47B69DF7CC885C741
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            • o[, xrefs: 005B5C8E
            • chansend: spurious wakeupcheckdead: no m for timercheckdead: no p for timercontext deadline exceededexplicit tag has no childframe_data_pad_byte_shortframe_headers_pad_too_bigframe_headers_zero_streamframe_priority_bad_lengthframe_settings_has_streamhttp2: Fra, xrefs: 005B5E42
            • unreachableuserenv.dllversion.dll (sensitive) B (goal KiB total, MB stacks, [recovered] allocCount found at *( gcscandone m->gsignal= maxTrigger= nDataRoots= nSpanRoots= pages/byte preemptoff= s.elemsize= s.sweepgen= span.limit= span.state= sysmonwa, xrefs: 005B597B
            • G waiting list is corruptedGetSecurityDescriptorLengthGetUserPreferredUILanguagesNAF digits must fit in int8No service system detected.PdhGetFormattedCounterValueSetupDiClassNameFromGuidExWSetupDiGetDeviceInstanceIdWSetupDiGetDriverInfoDetailWStartServiceCtrlD, xrefs: 005B5E66
            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID: o[$G waiting list is corruptedGetSecurityDescriptorLengthGetUserPreferredUILanguagesNAF digits must fit in int8No service system detected.PdhGetFormattedCounterValueSetupDiClassNameFromGuidExWSetupDiGetDeviceInstanceIdWSetupDiGetDriverInfoDetailWStartServiceCtrlD$chansend: spurious wakeupcheckdead: no m for timercheckdead: no p for timercontext deadline exceededexplicit tag has no childframe_data_pad_byte_shortframe_headers_pad_too_bigframe_headers_zero_streamframe_priority_bad_lengthframe_settings_has_streamhttp2: Fra$unreachableuserenv.dllversion.dll (sensitive) B (goal KiB total, MB stacks, [recovered] allocCount found at *( gcscandone m->gsignal= maxTrigger= nDataRoots= nSpanRoots= pages/byte preemptoff= s.elemsize= s.sweepgen= span.limit= span.state= sysmonwa
            • API String ID: 0-3592308213
            • Opcode ID: 969888e0b59f1b34e465cf2fdb80d77cb42e59e8bc156af539928c2b781a710d
            • Instruction ID: df9879b29d9b7660ab82960b6a166079f047ff471336ff84174f12f58be4af99
            • Opcode Fuzzy Hash: 969888e0b59f1b34e465cf2fdb80d77cb42e59e8bc156af539928c2b781a710d
            • Instruction Fuzzy Hash: C2F10232204F80C6DB14DB21E4843DEBBA2F785BE4F985625DA9D17BA5DF78D484CB40
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            • runtime: p scheddetailsechost.dllsecur32.dllshell32.dllshort writetls: alert(tracealloc(traffic updunreachableuserenv.dllversion.dll (sensitive) B (goal KiB total, MB stacks, [recovered] allocCount found at *( gcscandone m->gsignal= maxTrigger= nData, xrefs: 005C9786
            • flushGen gfreecnt= heapGoal= pages at ptrSize= runqsize= runqueue= s.base()= spinning= stopwait= stream=%d sweepgen sweepgen= targetpc= throwing= until pc=%!Weekday(%s|%s%s|%s, bound = , limit = .localhost/dev/stdin/etc/hosts122070312561035156258.8.8.8:53, xrefs: 005C97A5
            • p mcache not flushedpacer: assist ratio=pad length too largepreempt off reason: read_frame_too_largereflect.Value.SetIntreflect.makeFuncStubruntime: double waitselectgo: bad wakeupsemaRoot rotateRighttime: invalid numbertrace: out of memoryunexpected network: , xrefs: 005C97EA
            • != sweepgen MB globals, MB) workers= called from flushedWork idlethreads= in duration in host name is nil, not nStackRoots= out of range pluginpath= s.spanclass= span.base()= syscalltick= work.nproc= work.nwait= , gp->status=, not pointer-byte block (, xrefs: 005C97C5
            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID: != sweepgen MB globals, MB) workers= called from flushedWork idlethreads= in duration in host name is nil, not nStackRoots= out of range pluginpath= s.spanclass= span.base()= syscalltick= work.nproc= work.nwait= , gp->status=, not pointer-byte block ($ flushGen gfreecnt= heapGoal= pages at ptrSize= runqsize= runqueue= s.base()= spinning= stopwait= stream=%d sweepgen sweepgen= targetpc= throwing= until pc=%!Weekday(%s|%s%s|%s, bound = , limit = .localhost/dev/stdin/etc/hosts122070312561035156258.8.8.8:53$p mcache not flushedpacer: assist ratio=pad length too largepreempt off reason: read_frame_too_largereflect.Value.SetIntreflect.makeFuncStubruntime: double waitselectgo: bad wakeupsemaRoot rotateRighttime: invalid numbertrace: out of memoryunexpected network: $runtime: p scheddetailsechost.dllsecur32.dllshell32.dllshort writetls: alert(tracealloc(traffic updunreachableuserenv.dllversion.dll (sensitive) B (goal KiB total, MB stacks, [recovered] allocCount found at *( gcscandone m->gsignal= maxTrigger= nData
            • API String ID: 0-4255979612
            • Opcode ID: b3d00f1c261cf5fd7d22bf5047953e23f9b1cbc002c420d102159c6eacdbff18
            • Instruction ID: cb8baa36a245c9692fd5ab4195d9eeadd815ec2eb90be90a47c5e5825ff1852b
            • Opcode Fuzzy Hash: b3d00f1c261cf5fd7d22bf5047953e23f9b1cbc002c420d102159c6eacdbff18
            • Instruction Fuzzy Hash: E2E1C476605B80CAEB00DF65E48479EBB65F78A7A0F85422ADAAD437E5DF3CC481C701
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            • runtime: casgstatus: oldval=runtime: no module data for save on system g not allowedthe service is not installedunexpected protocol version x509: invalid DSA parametersx509: invalid DSA public keyx509: invalid RSA public key45474735088646411895751953125CM_Get_, xrefs: 005EB1ED
            • casgstatus: waiting for Gwaiting but is Grunnablechacha20poly1305: bad nonce length passed to Openchacha20poly1305: bad nonce length passed to Sealcrypto/elliptic: internal error: invalid encodingcrypto/tls: ExportKeyingMaterial context too longdelayed zeroing, xrefs: 005EB1A5
            • casgstatus: bad incoming valuescheckmark found unmarked objectcrypto/ecdh: invalid public keyentersyscallblock inconsistent fmt: unknown base; can't happenframe_headers_prio_weight_shorthttp2: connection error: %v: %vinternal error - misuse of itabinvalid netw, xrefs: 005EB22F
            • newval= nfreed= packed= ping=%q pointer stack=[ status %!Month(%02d%02d2.5.4.102.5.4.112.5.4.1748828125AcceptExAcceptedArmenianBAD RANKBalineseBopomofoBugineseCancelIoCherokeeClassANYConflictContinueCurveID(CyrillicDNS nameDSA-SHA1DecemberDuployanEqualSidEthi, xrefs: 005EB208
            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID: newval= nfreed= packed= ping=%q pointer stack=[ status %!Month(%02d%02d2.5.4.102.5.4.112.5.4.1748828125AcceptExAcceptedArmenianBAD RANKBalineseBopomofoBugineseCancelIoCherokeeClassANYConflictContinueCurveID(CyrillicDNS nameDSA-SHA1DecemberDuployanEqualSidEthi$casgstatus: bad incoming valuescheckmark found unmarked objectcrypto/ecdh: invalid public keyentersyscallblock inconsistent fmt: unknown base; can't happenframe_headers_prio_weight_shorthttp2: connection error: %v: %vinternal error - misuse of itabinvalid netw$casgstatus: waiting for Gwaiting but is Grunnablechacha20poly1305: bad nonce length passed to Openchacha20poly1305: bad nonce length passed to Sealcrypto/elliptic: internal error: invalid encodingcrypto/tls: ExportKeyingMaterial context too longdelayed zeroing$runtime: casgstatus: oldval=runtime: no module data for save on system g not allowedthe service is not installedunexpected protocol version x509: invalid DSA parametersx509: invalid DSA public keyx509: invalid RSA public key45474735088646411895751953125CM_Get_
            • API String ID: 0-1190589400
            • Opcode ID: 5d22a7565d6843b625f8f5e8ba0ec49a55c02ecd9ddde122ab6794979cfaf767
            • Instruction ID: 2ff57ff616bfd4e5a868aa6e6fe80b3e2e6b5b4ab59ea0209cb930fc71ef7827
            • Opcode Fuzzy Hash: 5d22a7565d6843b625f8f5e8ba0ec49a55c02ecd9ddde122ab6794979cfaf767
            • Instruction Fuzzy Hash: E0B1A036609BC4C6EB08CB26E49536EBB21F38AB90F588126EEDC43B55DF39D451CB01
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            • runtime/internal/runtime: level = runtime: nameOff runtime: pointer runtime: summary[runtime: textOff runtime: typeOff scanobject n == 0seeker can't seekselect (no cases)stack: frame={sp:swept cached spansync.RWMutex.Lockthread exhaustiontransfer-encodingtrunc, xrefs: 005E7FA3
            • runtime., xrefs: 005E7F70
            • bad restart PCbad span statecontent-lengthdata truncatedfile too largefinalizer waitgcstoptheworldgetprotobynameinternal errorinvalid pid %vinvalid syntaxis a directorylevel 2 haltedlevel 3 haltedmultipartfilesneed more datanil elem type!no module datano such , xrefs: 005E80C2
            • reflect., xrefs: 005E7FD4
            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID: bad restart PCbad span statecontent-lengthdata truncatedfile too largefinalizer waitgcstoptheworldgetprotobynameinternal errorinvalid pid %vinvalid syntaxis a directorylevel 2 haltedlevel 3 haltedmultipartfilesneed more datanil elem type!no module datano such $reflect.$runtime.$runtime/internal/runtime: level = runtime: nameOff runtime: pointer runtime: summary[runtime: textOff runtime: typeOff scanobject n == 0seeker can't seekselect (no cases)stack: frame={sp:swept cached spansync.RWMutex.Lockthread exhaustiontransfer-encodingtrunc
            • API String ID: 0-1370213113
            • Opcode ID: a3355b06b3aa0b141faa022d37b1b6f3191c9cd82fb9b8f840484a3cddafdf2f
            • Instruction ID: 2b266d3c54c8ee3bfad304e36cc55d026683b785df8b239d8fe397b086b27a9f
            • Opcode Fuzzy Hash: a3355b06b3aa0b141faa022d37b1b6f3191c9cd82fb9b8f840484a3cddafdf2f
            • Instruction Fuzzy Hash: F191AF72708B8486DB18CF16E44036EABA2F788BC4F988525EBDD47B59DF78C495CB40
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            • @r_, xrefs: 005F7AA1
            • selectgo: bad wakeupsemaRoot rotateRighttime: invalid numbertrace: out of memoryunexpected network: unknown PSK identityunknown address typewirep: already in goworkbuf is not emptywrite of Go pointer ws2_32.dll not foundx509: malformed spkix509usefallbackroots, xrefs: 005F80A9
            • gp.waiting != nilhandshake failureif-modified-sinceillegal parameterinteger too largeinvalid BMPStringinvalid IA5Stringinvalid bit size invalid stream IDlocked m0 woke upmark - bad statusmarkBits overflowmessage too largemissing closing )missing closing ]missi, xrefs: 005F80D0
            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID: @r_$gp.waiting != nilhandshake failureif-modified-sinceillegal parameterinteger too largeinvalid BMPStringinvalid IA5Stringinvalid bit size invalid stream IDlocked m0 woke upmark - bad statusmarkBits overflowmessage too largemissing closing )missing closing ]missi$selectgo: bad wakeupsemaRoot rotateRighttime: invalid numbertrace: out of memoryunexpected network: unknown PSK identityunknown address typewirep: already in goworkbuf is not emptywrite of Go pointer ws2_32.dll not foundx509: malformed spkix509usefallbackroots
            • API String ID: 0-245695312
            • Opcode ID: fc62bd33ba07da05b9ca4844426233a68243e807e04822bc7d3f5334a852bac5
            • Instruction ID: fdcb80c7d31649a869ea5935815201ad2f61515176810885d0a0215851ccd593
            • Opcode Fuzzy Hash: fc62bd33ba07da05b9ca4844426233a68243e807e04822bc7d3f5334a852bac5
            • Instruction Fuzzy Hash: 4FB2AB32209BC8C2CB60DF12E4443AABB62F789BD4F999916DF9A47759CF78C494C740
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            • o[, xrefs: 005B6A9D
            • unreachableuserenv.dllversion.dll (sensitive) B (goal KiB total, MB stacks, [recovered] allocCount found at *( gcscandone m->gsignal= maxTrigger= nDataRoots= nSpanRoots= pages/byte preemptoff= s.elemsize= s.sweepgen= span.limit= span.state= sysmonwa, xrefs: 005B67D0
            • G waiting list is corruptedGetSecurityDescriptorLengthGetUserPreferredUILanguagesNAF digits must fit in int8No service system detected.PdhGetFormattedCounterValueSetupDiClassNameFromGuidExWSetupDiGetDeviceInstanceIdWSetupDiGetDriverInfoDetailWStartServiceCtrlD, xrefs: 005B6B84
            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID: o[$G waiting list is corruptedGetSecurityDescriptorLengthGetUserPreferredUILanguagesNAF digits must fit in int8No service system detected.PdhGetFormattedCounterValueSetupDiClassNameFromGuidExWSetupDiGetDeviceInstanceIdWSetupDiGetDriverInfoDetailWStartServiceCtrlD$unreachableuserenv.dllversion.dll (sensitive) B (goal KiB total, MB stacks, [recovered] allocCount found at *( gcscandone m->gsignal= maxTrigger= nDataRoots= nSpanRoots= pages/byte preemptoff= s.elemsize= s.sweepgen= span.limit= span.state= sysmonwa
            • API String ID: 0-927581987
            • Opcode ID: 48331e4f21444dccd58f998b227f7c6699dda5cb3cf02231339370d3c7e5f0b8
            • Instruction ID: 44023e467a329317bbbddbaa3b28ba981b6c589bb5f805f3aa35b0ac439df679
            • Opcode Fuzzy Hash: 48331e4f21444dccd58f998b227f7c6699dda5cb3cf02231339370d3c7e5f0b8
            • Instruction Fuzzy Hash: E902AE32204B84C6DB60DF26E4843DABBA1F789BD4F989429DA8D47755CF7DD884C740
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            • runtime.preemptM: duplicatehandle failed; errno=runtime: waitforsingleobject unexpected; result=runtime: waitforsingleobject wait_failed; errno=slice bounds out of range [:%x] with capacity %ystrconv: illegal AppendFloat/FormatFloat bitSizesyscall: string with, xrefs: 005E44E5
            • self-preemptservices.exesetupapi.dllshort bufferspanSetSpinesweepWaiterstraceStringstransmitfileunexpected )unknown portunknown typewintrust.dllwirep: p->m=worker mode wtsapi32.dll != sweepgen MB globals, MB) workers= called from flushedWork idlethreads= i, xrefs: 005E4525
            • runtime.preemptM: duplicatehandle failedruntime: SyscallN has too many argumentsruntime: out of memory: cannot allocate runtime: typeBitsBulkBarrier with type ryuFtoaFixed32 called with negative prectime: Stop called on uninitialized Timertls: received empty , xrefs: 005E450F
            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID: runtime.preemptM: duplicatehandle failed; errno=runtime: waitforsingleobject unexpected; result=runtime: waitforsingleobject wait_failed; errno=slice bounds out of range [:%x] with capacity %ystrconv: illegal AppendFloat/FormatFloat bitSizesyscall: string with$runtime.preemptM: duplicatehandle failedruntime: SyscallN has too many argumentsruntime: out of memory: cannot allocate runtime: typeBitsBulkBarrier with type ryuFtoaFixed32 called with negative prectime: Stop called on uninitialized Timertls: received empty $self-preemptservices.exesetupapi.dllshort bufferspanSetSpinesweepWaiterstraceStringstransmitfileunexpected )unknown portunknown typewintrust.dllwirep: p->m=worker mode wtsapi32.dll != sweepgen MB globals, MB) workers= called from flushedWork idlethreads= i
            • API String ID: 0-594971780
            • Opcode ID: 76051edf4fa0b23e7491a1053765eaae4725a539399f4ed470eecdeab4fcc8a3
            • Instruction ID: 86fe817f0acd0624ef9aa52ccc46226707267cab23a0768669fdcf292155bdee
            • Opcode Fuzzy Hash: 76051edf4fa0b23e7491a1053765eaae4725a539399f4ed470eecdeab4fcc8a3
            • Instruction Fuzzy Hash: 6CC16B36605BC486DB14DF26E4453AABB60F38AB90F559232EB9C93B95DF38C491CB00
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            • pacer: assist ratio=pad length too largepreempt off reason: read_frame_too_largereflect.Value.SetIntreflect.makeFuncStubruntime: double waitselectgo: bad wakeupsemaRoot rotateRighttime: invalid numbertrace: out of memoryunexpected network: unknown PSK identity, xrefs: 005D0157
            • (scan (scan) MB in Value> allocs dying= flags= len=%d locks= m->g0= nmsys= pad1= pad2= s=nil text= zombie% CPU (%v: %#x, goid=, j0 = 19531252.5.4.32.5.4.52.5.4.62.5.4.72.5.4.82.5.4.99765625: type ::ffff::method:scheme:statusAvestanBengaliBrailleCLOSINGC, xrefs: 005D0177
            • MB) workers= called from flushedWork idlethreads= in duration in host name is nil, not nStackRoots= out of range pluginpath= s.spanclass= span.base()= syscalltick= work.nproc= work.nwait= , gp->status=, not pointer-byte block (3814697265625: unknown pc , xrefs: 005D01D4
            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID: (scan (scan) MB in Value> allocs dying= flags= len=%d locks= m->g0= nmsys= pad1= pad2= s=nil text= zombie% CPU (%v: %#x, goid=, j0 = 19531252.5.4.32.5.4.52.5.4.62.5.4.72.5.4.82.5.4.99765625: type ::ffff::method:scheme:statusAvestanBengaliBrailleCLOSINGC$ MB) workers= called from flushedWork idlethreads= in duration in host name is nil, not nStackRoots= out of range pluginpath= s.spanclass= span.base()= syscalltick= work.nproc= work.nwait= , gp->status=, not pointer-byte block (3814697265625: unknown pc $pacer: assist ratio=pad length too largepreempt off reason: read_frame_too_largereflect.Value.SetIntreflect.makeFuncStubruntime: double waitselectgo: bad wakeupsemaRoot rotateRighttime: invalid numbertrace: out of memoryunexpected network: unknown PSK identity
            • API String ID: 0-2011844857
            • Opcode ID: ccf67dccc4be2ba1896b42b905d3eb93e8d08bef49befac7c1d1bf20279835dc
            • Instruction ID: 4514dd0d2723ec34fb492a6fb496163b9dbab49ba3cad6812dd151f5162f931a
            • Opcode Fuzzy Hash: ccf67dccc4be2ba1896b42b905d3eb93e8d08bef49befac7c1d1bf20279835dc
            • Instruction Fuzzy Hash: B5710572A19F81C5D716EB26E84436A7BA5FBCA7C0F849277AA8D17725CF38C041C700
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            • internal lockOSThread errorinvalid HTTP header name %qinvalid P224 point encodinginvalid P256 point encodinginvalid P384 point encodinginvalid P521 point encodinginvalid dependent stream IDinvalid profile bucket typeio.File missing Seek methodkey was rejected , xrefs: 005F076F
            • invalid m->lockedInt = invalid scalar encodingleft over markroot jobsmakechan: bad alignmentmalformed HTTP responsemissing port in addressmissing protocol schememissing type in runfinqnanotime returning zeronet/http: abort Handlernetwork not implementedno appl, xrefs: 005F0746
            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID: internal lockOSThread errorinvalid HTTP header name %qinvalid P224 point encodinginvalid P256 point encodinginvalid P384 point encodinginvalid P521 point encodinginvalid dependent stream IDinvalid profile bucket typeio.File missing Seek methodkey was rejected $invalid m->lockedInt = invalid scalar encodingleft over markroot jobsmakechan: bad alignmentmalformed HTTP responsemissing port in addressmissing protocol schememissing type in runfinqnanotime returning zeronet/http: abort Handlernetwork not implementedno appl
            • API String ID: 0-4280029267
            • Opcode ID: 0b3a5b791afacb3e6123bd855356d9f0e6556ce0683e902eed8b71c1281566b0
            • Instruction ID: 5a52e6d2a62b16e0338165873e2e651c6b22832f7d01fd3997a2d709ac335bbb
            • Opcode Fuzzy Hash: 0b3a5b791afacb3e6123bd855356d9f0e6556ce0683e902eed8b71c1281566b0
            • Instruction Fuzzy Hash: 2171BE32605B84C6DB00DF20E4443AEB761F785B84F896225DB8D1B7A9CF7CD546C740
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID: \
            • API String ID: 0-2967466578
            • Opcode ID: 0661f7601cab52a39a41ccceb6b1c5d6febebe11f5746e6828dda34d285a7299
            • Instruction ID: 1676ea5d8e6c4884c518710721e17e0939dd156befe46979c0738c3d6b22af71
            • Opcode Fuzzy Hash: 0661f7601cab52a39a41ccceb6b1c5d6febebe11f5746e6828dda34d285a7299
            • Instruction Fuzzy Hash: 00329D66309FD489DB60CB56F8507AEA762F389BD0F888126DE8D57B49CF7CC4858B00
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            • !"#$%%&&''((()))*++,,,,,------....//////0001123333333333444444444455666677777888888888889999999999::::::;;;;;;;;;;;;;;;;<<<<<<<<<<<<<<<<=====>>>>>>>>>>>??????????@@@@@@@@@@@@@@@@@@@@@@AAAAAAAAAAAAAAAAAAAAABBBBBBBBBBBCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC, xrefs: 005FA750, 005FA830, 005FA950, 005FAA4E
            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID: !"#$%%&&''((()))*++,,,,,------....//////0001123333333333444444444455666677777888888888889999999999::::::;;;;;;;;;;;;;;;;<<<<<<<<<<<<<<<<=====>>>>>>>>>>>??????????@@@@@@@@@@@@@@@@@@@@@@AAAAAAAAAAAAAAAAAAAAABBBBBBBBBBBCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
            • API String ID: 0-2911004680
            • Opcode ID: d2276240383f3a2468f9c862eceb467606dac8a60f080cf1b8dcdf47eabd48f6
            • Instruction ID: f06c329d96389fb911232aa07055a82d5c8b66ad4ca2af64fdbc311b947ef119
            • Opcode Fuzzy Hash: d2276240383f3a2468f9c862eceb467606dac8a60f080cf1b8dcdf47eabd48f6
            • Instruction Fuzzy Hash: 5EE1E3E2344B8882DA049B11E5403BDAB63F785BE0F889526EB5E47B99DF7CC484C747
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            • invalid length of trace eventio: read/write on closed pipemachine is not on the networkmime: invalid media parametermismatched local address typeno XENIX semaphores availablenotesleep - waitm out of syncnumerical result out of rangeoperation already in progres, xrefs: 00605508
            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID: invalid length of trace eventio: read/write on closed pipemachine is not on the networkmime: invalid media parametermismatched local address typeno XENIX semaphores availablenotesleep - waitm out of syncnumerical result out of rangeoperation already in progres
            • API String ID: 0-1426604052
            • Opcode ID: 8659f119134e4bb99fe1def0e651bc0052279025c07394e52812f30e84a48f42
            • Instruction ID: 3ff589736caf59ec9807a426c2c391788a0966d2b70d5fffc5b5e65e944ece17
            • Opcode Fuzzy Hash: 8659f119134e4bb99fe1def0e651bc0052279025c07394e52812f30e84a48f42
            • Instruction Fuzzy Hash: F3D1A072269F88C2CB588B15E0503EBB762F395BC0F94412AEA9B07B94DB38C491DF55
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            • grew heap, but no adequate free space foundhttp2: too many 1xx informational responseshttp2: unexpected ALPN protocol %q; want %qinterrupted system call should be restartedmethodValueCallFrameObjs is not in a modulemult64bitPow10: power of 10 is out of rangemu, xrefs: 005D77FA
            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID: grew heap, but no adequate free space foundhttp2: too many 1xx informational responseshttp2: unexpected ALPN protocol %q; want %qinterrupted system call should be restartedmethodValueCallFrameObjs is not in a modulemult64bitPow10: power of 10 is out of rangemu
            • API String ID: 0-817925779
            • Opcode ID: 76c4d32aaf47f44253a03bf3510694463b426a40c07141ebde28e92253dde03f
            • Instruction ID: b1f9b99179d2678eac97e1627ed11c4a484c059c4f41d9e82f6fef71afb1ed03
            • Opcode Fuzzy Hash: 76c4d32aaf47f44253a03bf3510694463b426a40c07141ebde28e92253dde03f
            • Instruction Fuzzy Hash: D8D17E72209BC885DB60CB29E49079ABB61F789BD0F589527DE8D83B59EF38C454CB00
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            • bulkBarrierPreWrite: unaligned argumentscannot free workbufs when work.full != 0cannot represent time as GeneralizedTimechacha20poly1305: invalid buffer overlapcrypto/cipher: message too large for GCMcrypto/cipher: output smaller than inputcrypto/rsa: input mu, xrefs: 005C4B4F
            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID: bulkBarrierPreWrite: unaligned argumentscannot free workbufs when work.full != 0cannot represent time as GeneralizedTimechacha20poly1305: invalid buffer overlapcrypto/cipher: message too large for GCMcrypto/cipher: output smaller than inputcrypto/rsa: input mu
            • API String ID: 0-2581119089
            • Opcode ID: 7d4edee966f41bde55be91e07d992cb89877bef284b18dc8f70ec830594754d5
            • Instruction ID: 77ec60fab0e6710de0bec7b75fbfae32e2ee94c24424209d2284f4daf038ce07
            • Opcode Fuzzy Hash: 7d4edee966f41bde55be91e07d992cb89877bef284b18dc8f70ec830594754d5
            • Instruction Fuzzy Hash: 2071D2B6715B9486DB10CF95E554B5AABA2F784BD0F54942AEF8D03B19DF38C4A0CB00
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            • bad summary databad symbol tablecastogscanstatuscontent-encodingcontent-languagecontent-locationcontext canceleddivision by zerogc: unswept spangcshrinkstackoffhost unreachablehostLookupOrder=integer overflowinvalid argumentinvalid encodinginvalid exchangeinva, xrefs: 005DC826
            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID: bad summary databad symbol tablecastogscanstatuscontent-encodingcontent-languagecontent-locationcontext canceleddivision by zerogc: unswept spangcshrinkstackoffhost unreachablehostLookupOrder=integer overflowinvalid argumentinvalid encodinginvalid exchangeinva
            • API String ID: 0-3169204691
            • Opcode ID: ee2fda9793eefed1cb1a3e0074d8659d73363f72ec8b6e808c53d2afe6f6d601
            • Instruction ID: 84895e7eac0a3195850d54619f4569a616756f13a6ebd4f2993154b6cdb2116b
            • Opcode Fuzzy Hash: ee2fda9793eefed1cb1a3e0074d8659d73363f72ec8b6e808c53d2afe6f6d601
            • Instruction Fuzzy Hash: 2851E3B7650F8882DB509F59E04039AAB65F789BE0F445227DFAD5379ACF78C084C740
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            • 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899, xrefs: 00626594
            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID: 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
            • API String ID: 0-2272463933
            • Opcode ID: 8983ce4285284f723642189e706a274f3b99d95aeebc057082b23c3d245001d6
            • Instruction ID: 25487066a72ed072eae77361e93de97b549a7d203e655d5e05a3f8c51d1009a9
            • Opcode Fuzzy Hash: 8983ce4285284f723642189e706a274f3b99d95aeebc057082b23c3d245001d6
            • Instruction Fuzzy Hash: 82410432708EB482CB18EB19F4106A9A653F394BD4FD9964AFE4B17789CF28C855CB44
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            • gcinggscanhchanhostshttpsimap2imap3imapsinet4inet6init int16int32int64matchmheapmonthntohspanicparsepop3srangerune scav schedsleepslicesockssse41sse42ssse3sudogsweeptext/tls: traceuint8usageutf-8write B -> FROM Value addr= alloc base code= ctxt: curg= free , xrefs: 005C9A52, 005C9A69
            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID: gcinggscanhchanhostshttpsimap2imap3imapsinet4inet6init int16int32int64matchmheapmonthntohspanicparsepop3srangerune scav schedsleepslicesockssse41sse42ssse3sudogsweeptext/tls: traceuint8usageutf-8write B -> FROM Value addr= alloc base code= ctxt: curg= free
            • API String ID: 0-1747049786
            • Opcode ID: 70590c834660a66ae1f3b9e6b867c04e092e7d33ad79ba01a86c7e0b6de1a580
            • Instruction ID: dbfdfd30170bd5c1b07fde8dead1e54a9c04b2047ef282c1486f7864d1a35bad
            • Opcode Fuzzy Hash: 70590c834660a66ae1f3b9e6b867c04e092e7d33ad79ba01a86c7e0b6de1a580
            • Instruction Fuzzy Hash: 9F71F232709B80DAEB00DF60F8897AABB61F786740F85862ADA4D837A5DF7DC544C701
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 26b1b6deca3f07e0251502e3510700f3b82ea55110f98f69e4c581c7686c6218
            • Instruction ID: 9c5262c946af0d15f891a454543ebf2de32a0833e449ffd79f6b9215e17932c6
            • Opcode Fuzzy Hash: 26b1b6deca3f07e0251502e3510700f3b82ea55110f98f69e4c581c7686c6218
            • Instruction Fuzzy Hash: 62F18B32249BC0D6DB6C8B21E64039BB362F745794F889526DF9E43B98DF78D4A4C740
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6ce58e7e6f1cc8ca54156fdf943a28210b8722433a1d244a5cb97f3e6a4de5e4
            • Instruction ID: b29d2bb5cf7d033d0d9603a1d45e7ec8df986d0da630b141b4f0a4fc1de1559b
            • Opcode Fuzzy Hash: 6ce58e7e6f1cc8ca54156fdf943a28210b8722433a1d244a5cb97f3e6a4de5e4
            • Instruction Fuzzy Hash: 01C1D533708EA482DA64CF1AF5017AAA762F388BC4F584415EE8E87B19DA79C955CF04
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0e6eb09f2450fdc678e6548622dce31df56b4acbd14e8aa5b02ec6754c113192
            • Instruction ID: e6064fe2dcb5e3678fdd018625e9370dfaefa0a6435dfaad9d83b6b0bc081fe4
            • Opcode Fuzzy Hash: 0e6eb09f2450fdc678e6548622dce31df56b4acbd14e8aa5b02ec6754c113192
            • Instruction Fuzzy Hash: 3BB12523B0CE648BEB20DF25F851BDA9353B789740FCB4826DA0A47795CA6DC8468B15
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d00ff997a56aba8fdfce259a117658a1188a163504620da45cc78a0631b232a3
            • Instruction ID: bf4386a10b30d5c897aebabc39e4bb3862050dbbebb111afaa3f36ca5be1d1d4
            • Opcode Fuzzy Hash: d00ff997a56aba8fdfce259a117658a1188a163504620da45cc78a0631b232a3
            • Instruction Fuzzy Hash: 89D15E76709FC485CA60DB97A840B9AAB61F389FD0F54412AEF9D63B59DF38D490CB00
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6a738bdd8024164bffc7f6cbcf9e2186ec9f96b868d54dd6d455954af93548b1
            • Instruction ID: df66f57d82aadd3d890d67baf0e45e254cd6024672f4d6c811c31085432039df
            • Opcode Fuzzy Hash: 6a738bdd8024164bffc7f6cbcf9e2186ec9f96b868d54dd6d455954af93548b1
            • Instruction Fuzzy Hash: C2C18C32309B8886EB14DF25E49536ABB71FBC6B80F545426EA8E87764DF7CD944CB00
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a2a1e973675e054596899f389eccfad518e45558fcbbe36cc9b5fbe5a99b703c
            • Instruction ID: 95a9a7d3984addbbc40a65230743ad663934c5f19e17b7c88a33b01de4c1c7a7
            • Opcode Fuzzy Hash: a2a1e973675e054596899f389eccfad518e45558fcbbe36cc9b5fbe5a99b703c
            • Instruction Fuzzy Hash: 26B1DE32205B84C6DB10DB15E1843EABBA1F785BD4F98592ACE8E07B65CF7DE495C380
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2311d6b5f75394ec0ef541f1412324d61284e2017643f997d32326a8678364a4
            • Instruction ID: 735a64d96f859315afa0800260ed4f7b94f4120de61494d3e87fcc0b6e7698a4
            • Opcode Fuzzy Hash: 2311d6b5f75394ec0ef541f1412324d61284e2017643f997d32326a8678364a4
            • Instruction Fuzzy Hash: 6FB1FB16D18FDB60E613577C9403BB62B206FF35D4F01D72ABAC2F16A3D7166A01B922
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 14b7f68ac376f6f4d52347cabb5126b5f8e0cfd52c09e2e3519b5f1e8456740a
            • Instruction ID: 71d54a1c3d5a5d4e52391ab359a35490805eba363b91d594bdc7a45a7bc806d7
            • Opcode Fuzzy Hash: 14b7f68ac376f6f4d52347cabb5126b5f8e0cfd52c09e2e3519b5f1e8456740a
            • Instruction Fuzzy Hash: 7181BE31B01B90CAFF2CDB16E4907A97B30F786B88F49542ADA8D17765CB78C885CB51
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8a7dea6761e4bc4025a878956ae23ffb9e24de19216abd5375a92ca264cca0d6
            • Instruction ID: 314ac16dc6d1355fbd8c30ef3cb28550db544938803095577f75c03276bb09d9
            • Opcode Fuzzy Hash: 8a7dea6761e4bc4025a878956ae23ffb9e24de19216abd5375a92ca264cca0d6
            • Instruction Fuzzy Hash: BA816F76728BD486CB18DB67A441B5ABF66F789BC0F984426FFC947B19CB38C4508B40
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 96450b973c504380de36effc1919276f2e1d1243b193bc8975cf3d3607530820
            • Instruction ID: 7f423bb322c492b6b36a17ef9636a0c8033a1e7fa7f60412909bf594b9385b9d
            • Opcode Fuzzy Hash: 96450b973c504380de36effc1919276f2e1d1243b193bc8975cf3d3607530820
            • Instruction Fuzzy Hash: 59914A77618F8582DB208B59F48029AB7A5F7C9BD4F545226EBAE53B99CF3CC051CB00
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5669d014a7841a318b30005f3efb412237f9951e25ac7e8bb24b5b15e0f597c6
            • Instruction ID: 57e4aee97ed54ba0f4c4cc1ca1f4e2cdd3caee0c212c4536be6adf239d929619
            • Opcode Fuzzy Hash: 5669d014a7841a318b30005f3efb412237f9951e25ac7e8bb24b5b15e0f597c6
            • Instruction Fuzzy Hash: DB717072758B8882DA20CF59E08076AAB63F795BC0F59512BEB8E53B59CB7CC041C740
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f38b8d035ed9ea3ad46d9d17e96d47b9c769c2d7965ddc643dc2c42a966010c9
            • Instruction ID: 0642cfc512f13f9814d2712916c6a49d334f4116e87d090179a1045d41ae09b6
            • Opcode Fuzzy Hash: f38b8d035ed9ea3ad46d9d17e96d47b9c769c2d7965ddc643dc2c42a966010c9
            • Instruction Fuzzy Hash: C5613A72209F848ADB45DB65A440B9ABB72F786BD0F48933AEA5D93785DF78C050C710
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 013f8ec3c784328c8fc4ab1019f44d81316437ff7d98f702769add0e75ed9f2d
            • Instruction ID: bd6a4a94f4d38757493d3b5b90861a4e98ce7559a0905a87bc312354e2e9bc69
            • Opcode Fuzzy Hash: 013f8ec3c784328c8fc4ab1019f44d81316437ff7d98f702769add0e75ed9f2d
            • Instruction Fuzzy Hash: B04105A6701A5941AE04CF6685200EAE762F74EFE0399E637CF2D77768C63CE902C344
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 95df54111b1ed5b8b00af7fd3b1bf0ec5091aac372c5c0ecc7f1241cbf4a944b
            • Instruction ID: 5fd2c708ab6f6f17342d28ee52a1bc3188a33d3e5371e8cb5c62e4e138149893
            • Opcode Fuzzy Hash: 95df54111b1ed5b8b00af7fd3b1bf0ec5091aac372c5c0ecc7f1241cbf4a944b
            • Instruction Fuzzy Hash: B641D622704948CBDF24DF66A09537BAB91FF887A8F884A35D76D43BC7D66CC4948B04
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 11187e784edc5c20ce42df8f3d5c239a3c0e5c4ee4d3e713c27f1393606e43a1
            • Instruction ID: 83a27a093ac65c2aa228adfaf44e324fabea7f13374f31003359c8e0134f72ed
            • Opcode Fuzzy Hash: 11187e784edc5c20ce42df8f3d5c239a3c0e5c4ee4d3e713c27f1393606e43a1
            • Instruction Fuzzy Hash: 3741F772A0BE4459DD17DB3E9561354A21BAFA3BE0F94C7239C3B763E5EB1990428304
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7573e5d914976ae6dc10e5cfb25ad7bca911e4232df9cf3d5a8ed157e2bb0c3c
            • Instruction ID: e1ecfabb8ed9b3285790f039b88ffcc61b0dd5aa5627f39d13f470a3c5a00d36
            • Opcode Fuzzy Hash: 7573e5d914976ae6dc10e5cfb25ad7bca911e4232df9cf3d5a8ed157e2bb0c3c
            • Instruction Fuzzy Hash: 7C2139B1F65E444ACA47DB3A8400355821ABF967C0F58C722AD1F77796F739D4C28240
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7b191cf503cef7b9eddcaaa3b608af85915d424f7770d9dec8eca69a2c3db2b0
            • Instruction ID: b8cfec19c3f6663419a3cfec425663c432fbcd4bc338ceb27a8eeea0eab7f81d
            • Opcode Fuzzy Hash: 7b191cf503cef7b9eddcaaa3b608af85915d424f7770d9dec8eca69a2c3db2b0
            • Instruction Fuzzy Hash: B4318C7A304B8A91DB44CB19E4913EA6B61F784BC4F859037DE4E47769DF38C64AC700
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 001852704fe434d27afe5dacb6bc33d90fdab754532107115e6306150740680a
            • Instruction ID: 22f3b6f299aa3945d463b27ce2439728ed9d2334a7d02d37ad63f2097c3d336a
            • Opcode Fuzzy Hash: 001852704fe434d27afe5dacb6bc33d90fdab754532107115e6306150740680a
            • Instruction Fuzzy Hash: 84215E36A09F85C1DB04CF15E45536ABB60F386BD4F549222EAED83BA9DB3CC191C740
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6f41dd1041c4166b6cf9dccf01c595ad5849fb8d0cff105f1bf291170286d72e
            • Instruction ID: 794b4323602c4ba5329039791ed0d586c8d0aac5208ca257562851875d6935ca
            • Opcode Fuzzy Hash: 6f41dd1041c4166b6cf9dccf01c595ad5849fb8d0cff105f1bf291170286d72e
            • Instruction Fuzzy Hash: B621E736204F89D5DB10DB22F4453AA7B61F34AB84F558622DADD83765EF3EC196C700
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: cc1816b9fb327e62f180e0674da4e2765cc9fc0cb51012fa894ebf2a2d319dc4
            • Instruction ID: d9b9be0d62fb7c5fc89a9d5b9be2e29893d4174279401d9ef00955ea940b7e56
            • Opcode Fuzzy Hash: cc1816b9fb327e62f180e0674da4e2765cc9fc0cb51012fa894ebf2a2d319dc4
            • Instruction Fuzzy Hash: DFE0EC26724E8080DA208B19E4413967720F788BB4F550312AEBD077E4CE38C2218F40
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2035454107.00000000005B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
            • Associated: 00000000.00000002.2035439975.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.000000000091C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AEC000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000AF2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1A000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B1E000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000B21000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000BA2000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2035454107.0000000000D35000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036064916.0000000000D9A000.00000080.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2036080492.0000000000D9B000.00000004.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5b0000_wr.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 029f6fed46ac446685fb91aef12ddb654e815247c2f047aebc8f3bfb398e6e0f
            • Instruction ID: 6224b1fd6ae54daf1370a06a1069907fdbaf213ceeb46256112d1c86834aba65
            • Opcode Fuzzy Hash: 029f6fed46ac446685fb91aef12ddb654e815247c2f047aebc8f3bfb398e6e0f
            • Instruction Fuzzy Hash: 70C08CB1907E8598FB108300A2403C8B9C6CF843C0E88C080826901624E7AC96C08104
            Uniqueness

            Uniqueness Score: -1.00%