Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
xm393ns0.exe

Overview

General Information

Sample name:xm393ns0.exe
Analysis ID:1431276
MD5:83f90ab89da59ab13fc97fb404e75a8e
SHA1:d28c10ad2223c31ed6151cdbca75c2917f7863a4
SHA256:224974155c0a18c9c01f1f6b8f66187c2f030df5cc1c68bf537a77ec8181fdd0
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Performs DNS queries to domains with low reputation
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Writes or reads registry keys via WMI
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Drops PE files
Found dropped PE file which has not been started or loaded
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w7x64
  • xm393ns0.exe (PID: 2148 cmdline: "C:\Users\user\Desktop\xm393ns0.exe" MD5: 83F90AB89DA59AB13FC97FB404E75A8E)
    • systeminfo.exe (PID: 1332 cmdline: systeminfo /fo csv MD5: 258B2ED54FC7F74E2FDCCE5861549C1A)
      • WmiPrvSE.exe (PID: 2912 cmdline: C:\Windows\sysWOW64\wbem\wmiprvse.exe -secured -Embedding MD5: 54B7C43C2E89F5CE71B2C255C1CF35E2)
    • cmd.exe (PID: 1396 cmdline: cmd.exe /c "del C:\Users\user\Desktop\xm393ns0.exe" MD5: AD7B9C14083B52BC532FBA5948342B98)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results
Source: xm393ns0.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: xm393ns0.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

Networking

barindex
Source: C:\Users\user\Desktop\xm393ns0.exeDNS query: LjZQsnIZIOXO7P.db0.xyz
Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: LjZQsnIZIOXO7P.db0.xyzUser-Agent: If you would like to opt out, please fill out this form: https://forms.office.com/r/i1h9pFXbKAHistory: LjZQsnIZIOXO7PAccept-Encoding: gzip
Source: global trafficDNS traffic detected: DNS query: LjZQsnIZIOXO7P.db0.xyz
Source: xm393ns0.exe, 00000000.00000002.604617157.000000000AC9E000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://LjZQsnIZIOXO7P.db0.xyz
Source: xm393ns0.exe, 00000000.00000002.604617157.000000000AC9E000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://LjZQsnIZIOXO7P.db0.xyzLjZQsnIZIOXO7P.db0.xyz:80REQUEST_METHODtcpLjZQsnIZIOXO7P.db0.xyziphlpap
Source: xm393ns0.exe, jZQs-eo6N153d.exe.0.drString found in binary or memory: http://historycmd.exefloat32float64UpgradeReferer
Source: xm393ns0.exe, jZQs-eo6N153d.exe.0.drString found in binary or memory: https://forms.office.com/r/i1h9pFXbKA

System Summary

barindex
Source: C:\Windows\SysWOW64\systeminfo.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue
Source: C:\Users\user\Desktop\xm393ns0.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: xm393ns0.exe, 00000000.00000002.603623309.00000000002FA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCmd.Exej% vs xm393ns0.exe
Source: xm393ns0.exe, 00000000.00000003.335755561.0000000000300000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesysinfo.exej% vs xm393ns0.exe
Source: xm393ns0.exe, 00000000.00000003.340319298.00000000002F7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCmd.Exej% vs xm393ns0.exe
Source: xm393ns0.exe, 00000000.00000003.335719938.00000000002FD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesysinfo.exej% vs xm393ns0.exe
Source: xm393ns0.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal52.troj.evad.winEXE@6/2@1/1
Source: C:\Users\user\Desktop\xm393ns0.exeFile created: C:\Users\user\Desktop\jZQs-eo6N153d.exeJump to behavior
Source: C:\Users\user\Desktop\xm393ns0.exeConsole Write: ........................................(.P.....`.......8...............................#.......................................................Jump to behavior
Source: C:\Users\user\Desktop\xm393ns0.exeConsole Write: ................@....`..........L.j.Z.Q.s.n.I.Z.I.O.X.O.7.P...d.b.0...x.y.z........s............................h...............#p.s............Jump to behavior
Source: C:\Users\user\Desktop\xm393ns0.exeConsole Write: ................@....`..........S.t.a.r.t.i.n.g. .k.e.y.l.o.g.g.e.r.............................P.DJ............X.H+....&.......................Jump to behavior
Source: xm393ns0.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\SysWOW64\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\Desktop\xm393ns0.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\xm393ns0.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: xm393ns0.exeString found in binary or memory: /usr/local/go/src/net/addrselect.go
Source: C:\Users\user\Desktop\xm393ns0.exeFile read: C:\Users\user\Desktop\xm393ns0.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\xm393ns0.exe "C:\Users\user\Desktop\xm393ns0.exe"
Source: C:\Users\user\Desktop\xm393ns0.exeProcess created: C:\Windows\SysWOW64\systeminfo.exe systeminfo /fo csv
Source: C:\Windows\SysWOW64\systeminfo.exeProcess created: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe C:\Windows\sysWOW64\wbem\wmiprvse.exe -secured -Embedding
Source: C:\Users\user\Desktop\xm393ns0.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c "del C:\Users\user\Desktop\xm393ns0.exe"
Source: C:\Users\user\Desktop\xm393ns0.exeProcess created: C:\Windows\SysWOW64\systeminfo.exe systeminfo /fo csvJump to behavior
Source: C:\Users\user\Desktop\xm393ns0.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c "del C:\Users\user\Desktop\xm393ns0.exe"Jump to behavior
Source: C:\Users\user\Desktop\xm393ns0.exeSection loaded: wow64win.dllJump to behavior
Source: C:\Users\user\Desktop\xm393ns0.exeSection loaded: wow64cpu.dllJump to behavior
Source: C:\Users\user\Desktop\xm393ns0.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\xm393ns0.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\xm393ns0.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\xm393ns0.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\xm393ns0.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\xm393ns0.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\xm393ns0.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\xm393ns0.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: wow64win.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: wow64cpu.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: wbemcomn2.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: bcrypt.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: rpcrtremote.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: ntdsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: wow64win.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: wow64cpu.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: wbemcomn2.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: bcrypt.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: ntdsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: rpcrtremote.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: esscli.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wow64win.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wow64cpu.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\xm393ns0.exeProcess created: C:\Windows\SysWOW64\systeminfo.exe systeminfo /fo csv
Source: xm393ns0.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: xm393ns0.exeStatic file information: File size 5152256 > 1048576
Source: xm393ns0.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x274c00
Source: xm393ns0.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x21c800
Source: xm393ns0.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: xm393ns0.exeStatic PE information: section name: .symtab
Source: jZQs-eo6N153d.exe.0.drStatic PE information: section name: .symtab
Source: C:\Users\user\Desktop\xm393ns0.exeFile created: C:\Users\user\Desktop\jZQs-eo6N153d.exeJump to dropped file
Source: C:\Users\user\Desktop\xm393ns0.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xm393ns0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xm393ns0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xm393ns0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xm393ns0.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xm393ns0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xm393ns0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xm393ns0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xm393ns0.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\SysWOW64\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapter
Source: C:\Users\user\Desktop\xm393ns0.exeDropped PE file which has not been started: C:\Users\user\Desktop\jZQs-eo6N153d.exeJump to dropped file
Source: C:\Windows\SysWOW64\systeminfo.exe TID: 2588Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exe TID: 2588Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe TID: 1148Thread sleep time: -240000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
Source: C:\Windows\SysWOW64\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
Source: C:\Windows\SysWOW64\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\xm393ns0.exeProcess created: C:\Windows\SysWOW64\systeminfo.exe systeminfo /fo csvJump to behavior
Source: C:\Users\user\Desktop\xm393ns0.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c "del C:\Users\user\Desktop\xm393ns0.exe"Jump to behavior
Source: C:\Users\user\Desktop\xm393ns0.exeQueries volume information: C:\Users\user\Desktop\jZQs-eo6N153d.exe VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts231
Windows Management Instrumentation
1
DLL Side-Loading
11
Process Injection
1
Masquerading
OS Credential Dumping12
Security Software Discovery
Remote ServicesData from Local System1
Ingress Tool Transfer
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts3
Command and Scripting Interpreter
Boot or Logon Initialization Scripts1
DLL Side-Loading
13
Virtualization/Sandbox Evasion
LSASS Memory13
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
Remote System Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets34
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://LjZQsnIZIOXO7P.db0.xyz0%Avira URL Cloudsafe
http://LjZQsnIZIOXO7P.db0.xyzLjZQsnIZIOXO7P.db0.xyz:80REQUEST_METHODtcpLjZQsnIZIOXO7P.db0.xyziphlpap0%Avira URL Cloudsafe
http://LjZQsnIZIOXO7P.db0.xyz/0%Avira URL Cloudsafe
http://historycmd.exefloat32float64UpgradeReferer0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
LjZQsnIZIOXO7P.db0.xyz
64.225.4.76
truetrue
    unknown
    NameMaliciousAntivirus DetectionReputation
    http://LjZQsnIZIOXO7P.db0.xyz/false
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://historycmd.exefloat32float64UpgradeRefererxm393ns0.exe, jZQs-eo6N153d.exe.0.drfalse
    • Avira URL Cloud: safe
    unknown
    https://forms.office.com/r/i1h9pFXbKAxm393ns0.exe, jZQs-eo6N153d.exe.0.drfalse
      high
      http://LjZQsnIZIOXO7P.db0.xyzxm393ns0.exe, 00000000.00000002.604617157.000000000AC9E000.00000004.00001000.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://LjZQsnIZIOXO7P.db0.xyzLjZQsnIZIOXO7P.db0.xyz:80REQUEST_METHODtcpLjZQsnIZIOXO7P.db0.xyziphlpapxm393ns0.exe, 00000000.00000002.604617157.000000000AC9E000.00000004.00001000.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      low
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      64.225.4.76
      LjZQsnIZIOXO7P.db0.xyzUnited States
      14061DIGITALOCEAN-ASNUStrue
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1431276
      Start date and time:2024-04-24 19:08:01 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 57s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
      Number of analysed new started processes analysed:8
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:xm393ns0.exe
      Detection:MAL
      Classification:mal52.troj.evad.winEXE@6/2@1/1
      EGA Information:Failed
      HCA Information:Failed
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, conhost.exe, svchost.exe
      • Execution Graph export aborted for target xm393ns0.exe, PID 2148 because there are no executed function
      • Not all processes where analyzed, report is missing behavior information
      • VT rate limit hit for: xm393ns0.exe
      TimeTypeDescription
      19:08:46API Interceptor248x Sleep call for process: WmiPrvSE.exe modified
      19:08:46API Interceptor13x Sleep call for process: systeminfo.exe modified
      19:08:47API Interceptor448x Sleep call for process: xm393ns0.exe modified
      No context
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      DIGITALOCEAN-ASNUShttps://btcpike.topGet hashmaliciousUnknownBrowse
      • 138.197.57.171
      SecuriteInfo.com.Program.Unwanted.5215.4772.1835.exeGet hashmaliciousPureLog StealerBrowse
      • 165.227.176.158
      SecuriteInfo.com.Program.Unwanted.5215.4772.1835.exeGet hashmaliciousPureLog StealerBrowse
      • 165.227.176.158
      https://i.imgur.com/EoTj4iI.pngGet hashmaliciousUnknownBrowse
      • 138.197.58.184
      https://i.imgur.com/VlAllek.pngGet hashmaliciousUnknownBrowse
      • 165.22.188.128
      https://url.za.m.mimecastprotect.com/s/oln8C66VVXhXmkXOs6FLej?domain=url3687.joseeustasiorivera.comGet hashmaliciousHTMLPhisherBrowse
      • 161.35.102.60
      SecuriteInfo.com.Python.Stealer.1437.14994.32063.exeGet hashmaliciousPython StealerBrowse
      • 159.89.102.253
      https://www.longin-eki.co.jp.cduhzkc.cn/Get hashmaliciousUnknownBrowse
      • 165.22.249.193
      https://www.longin-eki.co.jp.nebxshr.cn/Get hashmaliciousUnknownBrowse
      • 165.22.249.193
      https://www.admin-longin.co.jp.mc3lva.cn/Get hashmaliciousUnknownBrowse
      • 165.22.249.193
      No context
      No context
      Process:C:\Users\user\Desktop\xm393ns0.exe
      File Type:PE32 executable (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):5152256
      Entropy (8bit):6.2564453335016275
      Encrypted:false
      SSDEEP:49152:Z1zp5TFcI2IG+5BvPSlOWpSUoUGzhIQYIp4VZSPq5F6e+LR8ijWcvx/vktxUERER:XrhtG+5dPS7pV3NKUzK0CR
      MD5:A87F60E4DDF364C0E0EF3E1B39AF76A0
      SHA1:C80BA1FECACCC84C526E8767F78D22ED8DBB6D3D
      SHA-256:52C24D779A533047ED9B102E61645EC9D5F3DC1B899E10404FFDD899F4095312
      SHA-512:4EA73ED54C54AEE6CFC85F2A2D6B25C0019B4990BD7BE7B6E99D7CA786984D8DD9CBAB2422A647D7087E57284E53888C3D2269CEFCCD8C453B7B92263AB50FFE
      Malicious:false
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.........N..............L'.........`........0I...@...........................Q...........@...................................O.^.............................O......................................................3I..............................text....K'......L'................. ..`.rdata..p.!..`'...!..P'.............@..@.data...H....0I.......I.............@....idata..^.....O.......L.............@....reloc........O.......L.............@..B.symtab.......Q.......N................B................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\cmd.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):81
      Entropy (8bit):4.013143500852
      Encrypted:false
      SSDEEP:3:ENuGB+mRFRoo9pzp+RNWo9ov:MuGjj6qpV+RM0ov
      MD5:D40EFE0D4C3F910B9E5CF2A61D384DBF
      SHA1:BD9CFD577DDA8DFC673FCFCEC5E80343F3DB96E6
      SHA-256:BE8397F1FE46CA8369C9CA7E8A3234F915022AFBD7D177EE974FC7309661084C
      SHA-512:F10EE99A5858CFEA0478CFA75397444CC7E9F669AAC1444D97C4D98CBF6FA4A82BF5F16F68CC373702E6383C47F239F400D2D1B30794213A1B5C97AD901A6ED4
      Malicious:false
      Reputation:low
      Preview:The process cannot access the file because it is being used by another process...
      File type:PE32 executable (console) Intel 80386, for MS Windows
      Entropy (8bit):6.256443581363664
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.94%
      • Win16/32 Executable Delphi generic (2074/23) 0.02%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:xm393ns0.exe
      File size:5'152'256 bytes
      MD5:83f90ab89da59ab13fc97fb404e75a8e
      SHA1:d28c10ad2223c31ed6151cdbca75c2917f7863a4
      SHA256:224974155c0a18c9c01f1f6b8f66187c2f030df5cc1c68bf537a77ec8181fdd0
      SHA512:68421fecc977537880b1b0d0602e38e5e4f971a64617ccc2c50c07db3fe0e173c699a351cbcbcff5136a7dcce545e160b18a4293a0a7d1197dced1270749a001
      SSDEEP:49152:Z1zp5TFcI2IG+5BvPSlOWpSUoUGzhIQYIp4VZSPq5F6e+LR8ijFcvx/vktxUERER:XrhtG+5dPS7pV3NKUwK0CR
      TLSH:16362941FACB44F6DA07193050A7623F67346D068B29DBDBEB107B2EE9336951E32349
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.........N..............L'.........`........0I...@...........................Q...........@................................
      Icon Hash:aaf3e3e3918382a0
      Entrypoint:0x469260
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows cui
      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:6
      OS Version Minor:1
      File Version Major:6
      File Version Minor:1
      Subsystem Version Major:6
      Subsystem Version Minor:1
      Import Hash:4f2f006e2ecf7172ad368f8289dc96c1
      Instruction
      jmp 00007F2DB51F40B0h
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      sub esp, 28h
      mov dword ptr [esp+1Ch], ebx
      mov dword ptr [esp+10h], ebp
      mov dword ptr [esp+14h], esi
      mov dword ptr [esp+18h], edi
      mov dword ptr [esp], eax
      mov dword ptr [esp+04h], ecx
      call 00007F2DB51D9FD6h
      mov eax, dword ptr [esp+08h]
      mov edi, dword ptr [esp+18h]
      mov esi, dword ptr [esp+14h]
      mov ebp, dword ptr [esp+10h]
      mov ebx, dword ptr [esp+1Ch]
      add esp, 28h
      retn 0004h
      ret
      int3
      int3
      int3
      int3
      int3
      int3
      sub esp, 08h
      mov ecx, dword ptr [esp+0Ch]
      mov edx, dword ptr [ecx]
      mov eax, esp
      mov dword ptr [edx+04h], eax
      sub eax, 00010000h
      mov dword ptr [edx], eax
      add eax, 00000BA0h
      mov dword ptr [edx+08h], eax
      mov dword ptr [edx+0Ch], eax
      lea edi, dword ptr [ecx+34h]
      mov dword ptr [edx+18h], ecx
      mov dword ptr [edi], edx
      mov dword ptr [esp+04h], edi
      call 00007F2DB51F64E4h
      cld
      call 00007F2DB51F559Eh
      call 00007F2DB51F41D9h
      add esp, 08h
      ret
      mov ebx, dword ptr [esp+04h]
      mov dword ptr fs:[00000034h], 00000000h
      mov ebp, esp
      mov ecx, dword ptr [ebx+04h]
      mov eax, ecx
      shl eax, 02h
      sub esp, eax
      mov edi, esp
      mov esi, dword ptr [ebx+08h]
      cld
      rep movsd
      call dword ptr [ebx]
      mov esp, ebp
      mov ebx, dword ptr [esp+04h]
      mov dword ptr [ebx+0Ch], eax
      mov dword ptr [ebx+10h], edx
      mov eax, dword ptr fs:[00000034h]
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x4fe0000x45e.idata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x4ff0000x1c514.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x4933000xb8.data
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x274b9d0x274c00662f6b57b326dd1afc48d7f91c0149f2unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x2760000x21c6700x21c800070f5a7d08fe472a13a12b083757c873unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0x4930000x6a4480x3b800c9ab180a4db5d4e1996f8e69021a26f8False0.4408851431197479data5.490589297036973IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .idata0x4fe0000x45e0x600f70528ebe29ae02c47194ff165938d9fFalse0.3606770833333333data3.9035599415008737IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .reloc0x4ff0000x1c5140x1c6007b3831926b717571cea86c3af4fd57f9False0.6221004267621145data6.6751120196640565IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      .symtab0x51c0000x40x20007b5472d347d42780469fb2654b7fc54False0.02734375data0.020393135236084953IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      DLLImport
      kernel32.dllWriteFile, WriteConsoleW, WerSetFlags, WerGetFlags, WaitForMultipleObjects, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, TlsAlloc, SwitchToThread, SuspendThread, SetWaitableTimer, SetUnhandledExceptionFilter, SetProcessPriorityBoost, SetEvent, SetErrorMode, SetConsoleCtrlHandler, ResumeThread, RaiseFailFastException, PostQueuedCompletionStatus, LoadLibraryW, LoadLibraryExW, SetThreadContext, GetThreadContext, GetSystemInfo, GetSystemDirectoryA, GetStdHandle, GetQueuedCompletionStatusEx, GetProcessAffinityMask, GetProcAddress, GetErrorMode, GetEnvironmentStringsW, GetCurrentThreadId, GetConsoleMode, FreeEnvironmentStringsW, ExitProcess, DuplicateHandle, CreateWaitableTimerExW, CreateThread, CreateIoCompletionPort, CreateFileA, CreateEventA, CloseHandle, AddVectoredExceptionHandler
      TimestampSource PortDest PortSource IPDest IP
      Apr 24, 2024 19:08:48.331635952 CEST4916380192.168.2.2264.225.4.76
      Apr 24, 2024 19:08:48.557914972 CEST804916364.225.4.76192.168.2.22
      Apr 24, 2024 19:08:48.557996035 CEST4916380192.168.2.2264.225.4.76
      Apr 24, 2024 19:08:48.558511972 CEST4916380192.168.2.2264.225.4.76
      Apr 24, 2024 19:08:48.786273956 CEST804916364.225.4.76192.168.2.22
      Apr 24, 2024 19:08:48.786456108 CEST804916364.225.4.76192.168.2.22
      Apr 24, 2024 19:08:48.997517109 CEST4916380192.168.2.2264.225.4.76
      Apr 24, 2024 19:09:18.783000946 CEST4916380192.168.2.2264.225.4.76
      Apr 24, 2024 19:09:19.005194902 CEST804916364.225.4.76192.168.2.22
      Apr 24, 2024 19:09:49.020116091 CEST4916380192.168.2.2264.225.4.76
      Apr 24, 2024 19:09:49.242635965 CEST804916364.225.4.76192.168.2.22
      Apr 24, 2024 19:10:03.853826046 CEST804916364.225.4.76192.168.2.22
      Apr 24, 2024 19:10:03.853900909 CEST4916380192.168.2.2264.225.4.76
      Apr 24, 2024 19:10:33.854548931 CEST4916380192.168.2.2264.225.4.76
      Apr 24, 2024 19:10:34.077847958 CEST804916364.225.4.76192.168.2.22
      TimestampSource PortDest PortSource IPDest IP
      Apr 24, 2024 19:08:48.081341028 CEST5456253192.168.2.228.8.8.8
      Apr 24, 2024 19:08:48.329790115 CEST53545628.8.8.8192.168.2.22
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Apr 24, 2024 19:08:48.081341028 CEST192.168.2.228.8.8.80xc2fcStandard query (0)LjZQsnIZIOXO7P.db0.xyzA (IP address)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Apr 24, 2024 19:08:48.329790115 CEST8.8.8.8192.168.2.220xc2fcNo error (0)LjZQsnIZIOXO7P.db0.xyz64.225.4.76A (IP address)IN (0x0001)false
      • ljzqsnizioxo7p.db0.xyz
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.224916364.225.4.76802148C:\Users\user\Desktop\xm393ns0.exe
      TimestampBytes transferredDirectionData
      Apr 24, 2024 19:08:48.558511972 CEST204OUTGET / HTTP/1.1
      Host: LjZQsnIZIOXO7P.db0.xyz
      User-Agent: If you would like to opt out, please fill out this form: https://forms.office.com/r/i1h9pFXbKA
      History: LjZQsnIZIOXO7P
      Accept-Encoding: gzip
      Apr 24, 2024 19:08:48.786456108 CEST315INHTTP/1.1 502 Bad Gateway
      Server: nginx
      Date: Wed, 24 Apr 2024 17:08:48 GMT
      Content-Type: text/html; charset=utf-8
      Content-Length: 150
      Connection: keep-alive
      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
      Data Ascii: <html><head><title>502 Bad Gateway</title></head><body><center><h1>502 Bad Gateway</h1></center><hr><center>nginx</center></body></html>
      Apr 24, 2024 19:09:18.783000946 CEST6OUTData Raw: 00
      Data Ascii:
      Apr 24, 2024 19:09:49.020116091 CEST6OUTData Raw: 00
      Data Ascii:
      Apr 24, 2024 19:10:33.854548931 CEST6OUTData Raw: 00
      Data Ascii:


      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:19:08:46
      Start date:24/04/2024
      Path:C:\Users\user\Desktop\xm393ns0.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\xm393ns0.exe"
      Imagebase:0x400000
      File size:5'152'256 bytes
      MD5 hash:83F90AB89DA59AB13FC97FB404E75A8E
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:3
      Start time:19:08:46
      Start date:24/04/2024
      Path:C:\Windows\SysWOW64\systeminfo.exe
      Wow64 process (32bit):true
      Commandline:systeminfo /fo csv
      Imagebase:0x8d0000
      File size:75'776 bytes
      MD5 hash:258B2ED54FC7F74E2FDCCE5861549C1A
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:4
      Start time:19:08:46
      Start date:24/04/2024
      Path:C:\Windows\SysWOW64\wbem\WmiPrvSE.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\sysWOW64\wbem\wmiprvse.exe -secured -Embedding
      Imagebase:0x1080000
      File size:355'328 bytes
      MD5 hash:54B7C43C2E89F5CE71B2C255C1CF35E2
      Has elevated privileges:true
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:5
      Start time:19:08:48
      Start date:24/04/2024
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:cmd.exe /c "del C:\Users\user\Desktop\xm393ns0.exe"
      Imagebase:0x4a400000
      File size:302'592 bytes
      MD5 hash:AD7B9C14083B52BC532FBA5948342B98
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Reset < >
        Strings
        • runtime: VirtualQuery failed; errno=runtime: sudog with non-nil waitlinkruntime: mcall called on m->g0 stackstartm: P required for spinning=true) is not Grunnable or Gscanrunnableruntime: bad notifyList size - sync=accessed data from freed user arena runtime:, xrefs: 00435D8B
        • runtime.minit: duplicatehandle failed; errno=runtime: CreateWaitableTimerEx failed; errno=exitsyscall: syscall frame is no longer validunsafe.String: ptr is nil and len is not zerocannot send after transport endpoint shutdowncrypto/rsa: message too long for RS, xrefs: 00435E41
        • %, xrefs: 00435E7E
        • runtime.minit: duplicatehandle failed_cgo_notify_runtime_init_done missingstartTheWorld: inconsistent mp->nextpruntime: unexpected SPWRITE function all goroutines are asleep - deadlock!godebug: unexpected IncNonDefault of cannot exec a shared library directlyv, xrefs: 00435E75
        • bad g0 stackself-preempt [recovered]bad recoverybad g statusentersyscallwirep: p->m=) p->status=releasep: m= sysmonwait= preemptoff=cas64 failed m->gsignal=-byte limitruntime: sp=abi mismatch (sensitive)GetConsoleCPinvalid slothost is downillegal seekCypro_Mi, xrefs: 00435D64
        • CreateWaitableTimerEx when creating timer failedruntime.preemptM: duplicatehandle failed; errno=runtime: waitforsingleobject wait_failed; errno=syscall: string with NUL passed to StringToUTF16x509: X25519 key encoded with illegal parametersx509: SAN uniformRes, xrefs: 00435E1A
        • runtime: CreateWaitableTimerEx failed; errno=exitsyscall: syscall frame is no longer validunsafe.String: ptr is nil and len is not zerocannot send after transport endpoint shutdowncrypto/rsa: message too long for RSA key sizex509: IP constraint contained inval, xrefs: 00435DE6
        • VirtualQuery for stack base failedforEachP: sched.safePointWait != 0schedule: spinning with local workruntime: g is running but p is notdoaddtimer: P already set in timertoo many references: cannot spliceunexpected runtime.netpoll error: invalid nested repetit, xrefs: 00435DBF
        Memory Dump Source
        • Source File: 00000000.00000002.603649505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.603644517.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.603694369.0000000000676000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.603858927.0000000000893000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.603871443.0000000000895000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.603879917.0000000000896000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.603888478.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.603896974.0000000000898000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.603905569.0000000000899000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.603931374.00000000008C4000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.603939977.00000000008CB000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.603948449.00000000008CC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.603948449.00000000008D4000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.603948449.00000000008D9000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.603948449.00000000008F4000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.603948449.00000000008FB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.603991343.00000000008FE000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.603998406.00000000008FF000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_xm393ns0.jbxd
        Similarity
        • API ID:
        • String ID: %$CreateWaitableTimerEx when creating timer failedruntime.preemptM: duplicatehandle failed; errno=runtime: waitforsingleobject wait_failed; errno=syscall: string with NUL passed to StringToUTF16x509: X25519 key encoded with illegal parametersx509: SAN uniformRes$VirtualQuery for stack base failedforEachP: sched.safePointWait != 0schedule: spinning with local workruntime: g is running but p is notdoaddtimer: P already set in timertoo many references: cannot spliceunexpected runtime.netpoll error: invalid nested repetit$bad g0 stackself-preempt [recovered]bad recoverybad g statusentersyscallwirep: p->m=) p->status=releasep: m= sysmonwait= preemptoff=cas64 failed m->gsignal=-byte limitruntime: sp=abi mismatch (sensitive)GetConsoleCPinvalid slothost is downillegal seekCypro_Mi$runtime.minit: duplicatehandle failed; errno=runtime: CreateWaitableTimerEx failed; errno=exitsyscall: syscall frame is no longer validunsafe.String: ptr is nil and len is not zerocannot send after transport endpoint shutdowncrypto/rsa: message too long for RS$runtime.minit: duplicatehandle failed_cgo_notify_runtime_init_done missingstartTheWorld: inconsistent mp->nextpruntime: unexpected SPWRITE function all goroutines are asleep - deadlock!godebug: unexpected IncNonDefault of cannot exec a shared library directlyv$runtime: CreateWaitableTimerEx failed; errno=exitsyscall: syscall frame is no longer validunsafe.String: ptr is nil and len is not zerocannot send after transport endpoint shutdowncrypto/rsa: message too long for RSA key sizex509: IP constraint contained inval$runtime: VirtualQuery failed; errno=runtime: sudog with non-nil waitlinkruntime: mcall called on m->g0 stackstartm: P required for spinning=true) is not Grunnable or Gscanrunnableruntime: bad notifyList size - sync=accessed data from freed user arena runtime:
        • API String ID: 0-3801092541
        • Opcode ID: 5ca386f4cd102169c39c0e80885f02d9a67b19b50178324815d906769be81ab8
        • Instruction ID: bdea31c7d9f9c34f107594a652fe7280374aa96744c91e6d84f976e38896e4e1
        • Opcode Fuzzy Hash: 5ca386f4cd102169c39c0e80885f02d9a67b19b50178324815d906769be81ab8
        • Instruction Fuzzy Hash: 8691D0B45097019FD300EF65D199B1ABBE0BF48708F01A92EE4988B352EB78D945CF5B
        Uniqueness

        Uniqueness Score: -1.00%

        Strings
        • releasep: invalid p statecheckdead: no p for timercheckdead: no m for timerunknown sigtramp callbackunexpected fault address missing stack in newstackbad status in shrinkstackmissing traceGCSweepStartresource deadlock avoidedoperation now in progressno buffer , xrefs: 00446317
        • releasep: m= sysmonwait= preemptoff=cas64 failed m->gsignal=-byte limitruntime: sp=abi mismatch (sensitive)GetConsoleCPinvalid slothost is downillegal seekCypro_MinoanMeetei_MayekPahawh_HmongSora_SompengSyloti_Nagrinot pollableInstAltMatchunexpected )altmatch, xrefs: 00446275
        • p->status= in status idleprocs= gcwaiting= schedtick= timerslen= mallocing=bad timedivfloat64nan1float64nan2float64nan3float32nan2GOTRACEBACK) at entry+ (targetpc= , plugin: runtime: g : frame.sp=created by HTTPS_PROXYhttps_proxyNetShareAddNetShareDelbad mes, xrefs: 004462E3
        • m->p= p->m=SCHED curg= ctxt: min= max= (...) base CommonArabicBrahmiCarianChakmaCopticGothicHangulHatranHebrewKaithiKhojkiLepchaLycianLydianRejangSyriacTai_LeTangsaTangutTeluguThaanaWanchoYezidiempty rune1 rdtscppopcntLengthheaderAnswercmd/goSTREET<SHIFT><, xrefs: 00446297
        • releasep: invalid argcheckdead: runnable gruntime: newstack at runtime: newstack sp=runtime: confused by pcHeader.textStart= timer data corruptionNetUserGetLocalGroupsGetProfilesDirectoryWlink has been severedpackage not installedblock device requiredstate no, xrefs: 0044632D
        Memory Dump Source
        • Source File: 00000000.00000002.603649505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.603644517.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.603694369.0000000000676000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.603858927.0000000000893000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.603871443.0000000000895000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.603879917.0000000000896000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.603888478.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.603896974.0000000000898000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.603905569.0000000000899000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.603931374.00000000008C4000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.603939977.00000000008CB000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.603948449.00000000008CC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.603948449.00000000008D4000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.603948449.00000000008D9000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.603948449.00000000008F4000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.603948449.00000000008FB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.603991343.00000000008FE000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.603998406.00000000008FF000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_xm393ns0.jbxd
        Similarity
        • API ID:
        • String ID: m->p= p->m=SCHED curg= ctxt: min= max= (...) base CommonArabicBrahmiCarianChakmaCopticGothicHangulHatranHebrewKaithiKhojkiLepchaLycianLydianRejangSyriacTai_LeTangsaTangutTeluguThaanaWanchoYezidiempty rune1 rdtscppopcntLengthheaderAnswercmd/goSTREET<SHIFT><$ p->status= in status idleprocs= gcwaiting= schedtick= timerslen= mallocing=bad timedivfloat64nan1float64nan2float64nan3float32nan2GOTRACEBACK) at entry+ (targetpc= , plugin: runtime: g : frame.sp=created by HTTPS_PROXYhttps_proxyNetShareAddNetShareDelbad mes$releasep: invalid argcheckdead: runnable gruntime: newstack at runtime: newstack sp=runtime: confused by pcHeader.textStart= timer data corruptionNetUserGetLocalGroupsGetProfilesDirectoryWlink has been severedpackage not installedblock device requiredstate no$releasep: invalid p statecheckdead: no p for timercheckdead: no m for timerunknown sigtramp callbackunexpected fault address missing stack in newstackbad status in shrinkstackmissing traceGCSweepStartresource deadlock avoidedoperation now in progressno buffer $releasep: m= sysmonwait= preemptoff=cas64 failed m->gsignal=-byte limitruntime: sp=abi mismatch (sensitive)GetConsoleCPinvalid slothost is downillegal seekCypro_MinoanMeetei_MayekPahawh_HmongSora_SompengSyloti_Nagrinot pollableInstAltMatchunexpected )altmatch
        • API String ID: 0-1527155338
        • Opcode ID: bf8047a1b940d3cc2f78fc14a66b244c35610c04586989f1c8f76c9d8bbfd53c
        • Instruction ID: 2d37fd7b8d1b559f70236babf613e6727756f830b26b53c8f080941db6270096
        • Opcode Fuzzy Hash: bf8047a1b940d3cc2f78fc14a66b244c35610c04586989f1c8f76c9d8bbfd53c
        • Instruction Fuzzy Hash: 1441D2B45097058FD300EF65D195B1ABBE1FF88308F45996EE89887312D778D888CBA7
        Uniqueness

        Uniqueness Score: -1.00%