Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
xm393ns4.exe

Overview

General Information

Sample name:xm393ns4.exe
Analysis ID:1431558
MD5:bf30f725d867f62d2020d4ea18a9140b
SHA1:82b3b4539774511032e473b3956b31f015a25a0d
SHA256:39a55044a8919be58ee0d1580a1573e23cc56d48a7cba9f29b5a578a5a089582
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Writes or reads registry keys via WMI
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Drops PE files
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w7x64
  • xm393ns4.exe (PID: 2556 cmdline: "C:\Users\user\Desktop\xm393ns4.exe" MD5: BF30F725D867F62D2020D4EA18A9140B)
    • systeminfo.exe (PID: 2652 cmdline: systeminfo /fo csv MD5: 258B2ED54FC7F74E2FDCCE5861549C1A)
      • WmiPrvSE.exe (PID: 2452 cmdline: C:\Windows\sysWOW64\wbem\wmiprvse.exe -secured -Embedding MD5: 54B7C43C2E89F5CE71B2C255C1CF35E2)
    • cmd.exe (PID: 3172 cmdline: cmd.exe /c "del C:\Users\user\Desktop\xm393ns4.exe" MD5: AD7B9C14083B52BC532FBA5948342B98)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results
Source: xm393ns4.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: xm393ns4.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: Z4uofnIZILkJsb.q91.latUser-Agent: If you would like to opt out, please fill out this form: https://forms.office.com/r/i1h9pFXbKAHistory: Z4uofnIZILkJsbAccept-Encoding: gzip
Source: global trafficDNS traffic detected: DNS query: Z4uofnIZILkJsb.q91.lat
Source: xm393ns4.exe, 00000000.00000002.601512879.000000000AE12000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://Z4uofnIZILkJsb.q91.lat
Source: xm393ns4.exe, 00000000.00000002.601512879.000000000AE12000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://Z4uofnIZILkJsb.q91.latZ4uofnIZILkJsb.q91.lat:80REQUEST_METHODtcpZ4uofnIZILkJsb.q91.latiphlpap
Source: xm393ns4.exe, 4uof-MjWrlY2P.exe.0.drString found in binary or memory: http://historycmd.exefloat32float64UpgradeReferer
Source: xm393ns4.exe, 4uof-MjWrlY2P.exe.0.drString found in binary or memory: https://forms.office.com/r/i1h9pFXbKA

System Summary

barindex
Source: C:\Windows\SysWOW64\systeminfo.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue
Source: C:\Users\user\Desktop\xm393ns4.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: xm393ns4.exe, 00000000.00000003.332644889.0000000000320000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesysinfo.exej% vs xm393ns4.exe
Source: xm393ns4.exe, 00000000.00000002.601178412.000000000031A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCmd.Exej% vs xm393ns4.exe
Source: xm393ns4.exe, 00000000.00000003.338631987.0000000000317000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCmd.Exej% vs xm393ns4.exe
Source: xm393ns4.exe, 00000000.00000003.332626974.000000000031D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesysinfo.exej% vs xm393ns4.exe
Source: xm393ns4.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal48.evad.winEXE@6/2@1/1
Source: C:\Users\user\Desktop\xm393ns4.exeFile created: C:\Users\user\Desktop\4uof-MjWrlY2P.exeJump to behavior
Source: C:\Users\user\Desktop\xm393ns4.exeConsole Write: ........................................(.P..... ...............$.......-...............#.......................................................Jump to behavior
Source: C:\Users\user\Desktop\xm393ns4.exeConsole Write: ................@....`..........Z.4.u.o.f.n.I.Z.I.L.k.J.s.b...q.9.1...l.a.t........s............................h...............#p.s............Jump to behavior
Source: C:\Users\user\Desktop\xm393ns4.exeConsole Write: ................@....`..........S.t.a.r.t.i.n.g. .k.e.y.l.o.g.g.e.r.............................P..J............X.$.....&.......................Jump to behavior
Source: xm393ns4.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\SysWOW64\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\Desktop\xm393ns4.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\xm393ns4.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: xm393ns4.exeString found in binary or memory: /usr/local/go/src/net/addrselect.go
Source: C:\Users\user\Desktop\xm393ns4.exeFile read: C:\Users\user\Desktop\xm393ns4.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\xm393ns4.exe "C:\Users\user\Desktop\xm393ns4.exe"
Source: C:\Users\user\Desktop\xm393ns4.exeProcess created: C:\Windows\SysWOW64\systeminfo.exe systeminfo /fo csv
Source: C:\Windows\SysWOW64\systeminfo.exeProcess created: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe C:\Windows\sysWOW64\wbem\wmiprvse.exe -secured -Embedding
Source: C:\Users\user\Desktop\xm393ns4.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c "del C:\Users\user\Desktop\xm393ns4.exe"
Source: C:\Users\user\Desktop\xm393ns4.exeProcess created: C:\Windows\SysWOW64\systeminfo.exe systeminfo /fo csvJump to behavior
Source: C:\Users\user\Desktop\xm393ns4.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c "del C:\Users\user\Desktop\xm393ns4.exe"Jump to behavior
Source: C:\Users\user\Desktop\xm393ns4.exeSection loaded: wow64win.dllJump to behavior
Source: C:\Users\user\Desktop\xm393ns4.exeSection loaded: wow64cpu.dllJump to behavior
Source: C:\Users\user\Desktop\xm393ns4.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\xm393ns4.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\xm393ns4.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\xm393ns4.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\xm393ns4.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\xm393ns4.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\xm393ns4.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\xm393ns4.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: wow64win.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: wow64cpu.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: wbemcomn2.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: bcrypt.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: rpcrtremote.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: ntdsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: wow64win.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: wow64cpu.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: wbemcomn2.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: bcrypt.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: ntdsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: rpcrtremote.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: esscli.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wow64win.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wow64cpu.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\xm393ns4.exeProcess created: C:\Windows\SysWOW64\systeminfo.exe systeminfo /fo csv
Source: xm393ns4.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: xm393ns4.exeStatic file information: File size 5152256 > 1048576
Source: xm393ns4.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x274c00
Source: xm393ns4.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x21c800
Source: xm393ns4.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: xm393ns4.exeStatic PE information: section name: .symtab
Source: 4uof-MjWrlY2P.exe.0.drStatic PE information: section name: .symtab
Source: C:\Users\user\Desktop\xm393ns4.exeFile created: C:\Users\user\Desktop\4uof-MjWrlY2P.exeJump to dropped file
Source: C:\Users\user\Desktop\xm393ns4.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xm393ns4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xm393ns4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xm393ns4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xm393ns4.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xm393ns4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xm393ns4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xm393ns4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xm393ns4.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\SysWOW64\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapter
Source: C:\Users\user\Desktop\xm393ns4.exeDropped PE file which has not been started: C:\Users\user\Desktop\4uof-MjWrlY2P.exeJump to dropped file
Source: C:\Windows\SysWOW64\systeminfo.exe TID: 892Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exe TID: 892Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe TID: 3096Thread sleep time: -180000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
Source: C:\Windows\SysWOW64\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
Source: C:\Windows\SysWOW64\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\Desktop\xm393ns4.exeProcess created: C:\Windows\SysWOW64\systeminfo.exe systeminfo /fo csvJump to behavior
Source: C:\Users\user\Desktop\xm393ns4.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c "del C:\Users\user\Desktop\xm393ns4.exe"Jump to behavior
Source: C:\Users\user\Desktop\xm393ns4.exeQueries volume information: C:\Users\user\Desktop\4uof-MjWrlY2P.exe VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts231
Windows Management Instrumentation
1
DLL Side-Loading
11
Process Injection
1
Masquerading
OS Credential Dumping12
Security Software Discovery
Remote ServicesData from Local System2
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts3
Command and Scripting Interpreter
Boot or Logon Initialization Scripts1
DLL Side-Loading
13
Virtualization/Sandbox Evasion
LSASS Memory13
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media2
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager34
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
Remote System Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1431558 Sample: xm393ns4.exe Startdate: 25/04/2024 Architecture: WINDOWS Score: 48 6 xm393ns4.exe 1 2->6         started        dnsIp3 19 Z4uofnIZILkJsb.q91.lat 139.59.65.89, 49161, 80 DIGITALOCEAN-ASNUS Singapore 6->19 17 C:\Users\user\Desktop\4uof-MjWrlY2P.exe, PE32 6->17 dropped 10 systeminfo.exe 1 6->10         started        13 cmd.exe 6->13         started        file4 process5 signatures6 21 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 10->21 23 Writes or reads registry keys via WMI 10->23 15 WmiPrvSE.exe 10->15         started        process7

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://Z4uofnIZILkJsb.q91.lat/0%Avira URL Cloudsafe
http://historycmd.exefloat32float64UpgradeReferer0%Avira URL Cloudsafe
http://Z4uofnIZILkJsb.q91.latZ4uofnIZILkJsb.q91.lat:80REQUEST_METHODtcpZ4uofnIZILkJsb.q91.latiphlpap0%Avira URL Cloudsafe
http://Z4uofnIZILkJsb.q91.lat0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
Z4uofnIZILkJsb.q91.lat
139.59.65.89
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    http://Z4uofnIZILkJsb.q91.lat/false
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://Z4uofnIZILkJsb.q91.latZ4uofnIZILkJsb.q91.lat:80REQUEST_METHODtcpZ4uofnIZILkJsb.q91.latiphlpapxm393ns4.exe, 00000000.00000002.601512879.000000000AE12000.00000004.00001000.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    low
    http://historycmd.exefloat32float64UpgradeRefererxm393ns4.exe, 4uof-MjWrlY2P.exe.0.drfalse
    • Avira URL Cloud: safe
    unknown
    https://forms.office.com/r/i1h9pFXbKAxm393ns4.exe, 4uof-MjWrlY2P.exe.0.drfalse
      high
      http://Z4uofnIZILkJsb.q91.latxm393ns4.exe, 00000000.00000002.601512879.000000000AE12000.00000004.00001000.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      139.59.65.89
      Z4uofnIZILkJsb.q91.latSingapore
      14061DIGITALOCEAN-ASNUSfalse
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1431558
      Start date and time:2024-04-25 12:47:54 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 55s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
      Number of analysed new started processes analysed:8
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:xm393ns4.exe
      Detection:MAL
      Classification:mal48.evad.winEXE@6/2@1/1
      EGA Information:Failed
      HCA Information:Failed
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, conhost.exe, svchost.exe
      • Execution Graph export aborted for target xm393ns4.exe, PID 2556 because there are no executed function
      • Not all processes where analyzed, report is missing behavior information
      TimeTypeDescription
      12:48:36API Interceptor18x Sleep call for process: systeminfo.exe modified
      12:48:37API Interceptor911x Sleep call for process: WmiPrvSE.exe modified
      12:48:38API Interceptor454x Sleep call for process: xm393ns4.exe modified
      No context
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      DIGITALOCEAN-ASNUSwOIrAYQ8IM.elfGet hashmaliciousMiraiBrowse
      • 128.199.180.45
      http://jtmidgett.law/CaptRedr.htmlGet hashmaliciousHTMLPhisherBrowse
      • 159.65.82.236
      http://decktop.us/gORiyfGet hashmaliciousHTMLPhisherBrowse
      • 161.35.235.194
      xm393ns3.exeGet hashmaliciousUnknownBrowse
      • 161.35.82.213
      xm393ns3.exeGet hashmaliciousUnknownBrowse
      • 161.35.82.213
      xm393ns3.exeGet hashmaliciousUnknownBrowse
      • 161.35.82.213
      xm393ns0.exeGet hashmaliciousUnknownBrowse
      • 64.225.4.76
      xm393ns0.exeGet hashmaliciousUnknownBrowse
      • 64.225.4.76
      xm393ns0.exeGet hashmaliciousUnknownBrowse
      • 64.225.4.76
      https://btcpike.topGet hashmaliciousUnknownBrowse
      • 138.197.57.171
      No context
      No context
      Process:C:\Users\user\Desktop\xm393ns4.exe
      File Type:PE32 executable (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):5152256
      Entropy (8bit):6.256443512243998
      Encrypted:false
      SSDEEP:49152:h1zp5TFcI2IG+5BvPSlOWpSUoUGzhIQYIp4VZSPq5F6e+LR8ijFcPx/vktsUERER:PrhtG+5dPS7pV3NKUQO0fR
      MD5:826C6D3993110DAC591597B579B81503
      SHA1:CF355D8E10725526CEC45773CD335BD35585B58E
      SHA-256:25CC3D821E94FCFEDA3311D762D949DE9A5922B36AEB27806D455080423F3DDC
      SHA-512:A92382CCF6D91BD622C76BE2BE4DA2B918107E8C5838DE19BD6A46C6AAFC1BF75B80A834919C4226063FCB13CD234AA28B5F8F497B816D9F42B45BED90EC481C
      Malicious:false
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.........N..............L'.........`........0I...@...........................Q...........@...................................O.^.............................O......................................................3I..............................text....K'......L'................. ..`.rdata..p.!..`'...!..P'.............@..@.data...H....0I.......I.............@....idata..^.....O.......L.............@....reloc........O.......L.............@..B.symtab.......Q.......N................B................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\cmd.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):81
      Entropy (8bit):4.013143500852
      Encrypted:false
      SSDEEP:3:ENuGB+mRFRoo9pzp+RNWo9ov:MuGjj6qpV+RM0ov
      MD5:D40EFE0D4C3F910B9E5CF2A61D384DBF
      SHA1:BD9CFD577DDA8DFC673FCFCEC5E80343F3DB96E6
      SHA-256:BE8397F1FE46CA8369C9CA7E8A3234F915022AFBD7D177EE974FC7309661084C
      SHA-512:F10EE99A5858CFEA0478CFA75397444CC7E9F669AAC1444D97C4D98CBF6FA4A82BF5F16F68CC373702E6383C47F239F400D2D1B30794213A1B5C97AD901A6ED4
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview:The process cannot access the file because it is being used by another process...
      File type:PE32 executable (console) Intel 80386, for MS Windows
      Entropy (8bit):6.256442570349401
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.94%
      • Win16/32 Executable Delphi generic (2074/23) 0.02%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:xm393ns4.exe
      File size:5'152'256 bytes
      MD5:bf30f725d867f62d2020d4ea18a9140b
      SHA1:82b3b4539774511032e473b3956b31f015a25a0d
      SHA256:39a55044a8919be58ee0d1580a1573e23cc56d48a7cba9f29b5a578a5a089582
      SHA512:5a68394004bf59a09213733d05adf11671b1bdef31942e2bb61ac58cfb2f0106e6b0ad9e88e0eabc5185539cf976000827bfe12611f2dcbba76964236bd1dafb
      SSDEEP:49152:h1zp5TFcI2IG+5BvPSlOWpSUoUGzhIQYIp4VZSPq5F6e+LR8ijFcPx/vktsUERER:PrhtG+5dPS7pV3NKUwO0fR
      TLSH:42362941FACB44F6DA07193050A7623F67346D068B29DBDBEB107B2EE9336951E32349
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.........N..............L'.........`........0I...@...........................Q...........@................................
      Icon Hash:aaf3e3e3918382a0
      Entrypoint:0x469260
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows cui
      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:6
      OS Version Minor:1
      File Version Major:6
      File Version Minor:1
      Subsystem Version Major:6
      Subsystem Version Minor:1
      Import Hash:4f2f006e2ecf7172ad368f8289dc96c1
      Instruction
      jmp 00007F27706B7520h
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      sub esp, 28h
      mov dword ptr [esp+1Ch], ebx
      mov dword ptr [esp+10h], ebp
      mov dword ptr [esp+14h], esi
      mov dword ptr [esp+18h], edi
      mov dword ptr [esp], eax
      mov dword ptr [esp+04h], ecx
      call 00007F277069D446h
      mov eax, dword ptr [esp+08h]
      mov edi, dword ptr [esp+18h]
      mov esi, dword ptr [esp+14h]
      mov ebp, dword ptr [esp+10h]
      mov ebx, dword ptr [esp+1Ch]
      add esp, 28h
      retn 0004h
      ret
      int3
      int3
      int3
      int3
      int3
      int3
      sub esp, 08h
      mov ecx, dword ptr [esp+0Ch]
      mov edx, dword ptr [ecx]
      mov eax, esp
      mov dword ptr [edx+04h], eax
      sub eax, 00010000h
      mov dword ptr [edx], eax
      add eax, 00000BA0h
      mov dword ptr [edx+08h], eax
      mov dword ptr [edx+0Ch], eax
      lea edi, dword ptr [ecx+34h]
      mov dword ptr [edx+18h], ecx
      mov dword ptr [edi], edx
      mov dword ptr [esp+04h], edi
      call 00007F27706B9954h
      cld
      call 00007F27706B8A0Eh
      call 00007F27706B7649h
      add esp, 08h
      ret
      mov ebx, dword ptr [esp+04h]
      mov dword ptr fs:[00000034h], 00000000h
      mov ebp, esp
      mov ecx, dword ptr [ebx+04h]
      mov eax, ecx
      shl eax, 02h
      sub esp, eax
      mov edi, esp
      mov esi, dword ptr [ebx+08h]
      cld
      rep movsd
      call dword ptr [ebx]
      mov esp, ebp
      mov ebx, dword ptr [esp+04h]
      mov dword ptr [ebx+0Ch], eax
      mov dword ptr [ebx+10h], edx
      mov eax, dword ptr fs:[00000034h]
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x4fe0000x45e.idata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x4ff0000x1c514.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x4933000xb8.data
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x274b9d0x274c00eba9dcb100f7280d78ee0d1dadf01936unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x2760000x21c6700x21c800691834050bd43cf522b162723c6a76a2unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0x4930000x6a4480x3b800bf5f04741ca262918a609499570932f6False0.4408851431197479data5.490583630572336IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .idata0x4fe0000x45e0x600f70528ebe29ae02c47194ff165938d9fFalse0.3606770833333333data3.9035599415008737IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .reloc0x4ff0000x1c5140x1c6007b3831926b717571cea86c3af4fd57f9False0.6221004267621145data6.6751120196640565IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      .symtab0x51c0000x40x20007b5472d347d42780469fb2654b7fc54False0.02734375data0.020393135236084953IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      DLLImport
      kernel32.dllWriteFile, WriteConsoleW, WerSetFlags, WerGetFlags, WaitForMultipleObjects, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, TlsAlloc, SwitchToThread, SuspendThread, SetWaitableTimer, SetUnhandledExceptionFilter, SetProcessPriorityBoost, SetEvent, SetErrorMode, SetConsoleCtrlHandler, ResumeThread, RaiseFailFastException, PostQueuedCompletionStatus, LoadLibraryW, LoadLibraryExW, SetThreadContext, GetThreadContext, GetSystemInfo, GetSystemDirectoryA, GetStdHandle, GetQueuedCompletionStatusEx, GetProcessAffinityMask, GetProcAddress, GetErrorMode, GetEnvironmentStringsW, GetCurrentThreadId, GetConsoleMode, FreeEnvironmentStringsW, ExitProcess, DuplicateHandle, CreateWaitableTimerExW, CreateThread, CreateIoCompletionPort, CreateFileA, CreateEventA, CloseHandle, AddVectoredExceptionHandler
      TimestampSource PortDest PortSource IPDest IP
      Apr 25, 2024 12:48:40.150504112 CEST4916180192.168.2.22139.59.65.89
      Apr 25, 2024 12:48:40.510319948 CEST8049161139.59.65.89192.168.2.22
      Apr 25, 2024 12:48:40.510401964 CEST4916180192.168.2.22139.59.65.89
      Apr 25, 2024 12:48:40.510710001 CEST4916180192.168.2.22139.59.65.89
      Apr 25, 2024 12:48:40.869010925 CEST8049161139.59.65.89192.168.2.22
      Apr 25, 2024 12:48:40.869232893 CEST8049161139.59.65.89192.168.2.22
      Apr 25, 2024 12:48:41.076138973 CEST4916180192.168.2.22139.59.65.89
      Apr 25, 2024 12:49:10.878772974 CEST4916180192.168.2.22139.59.65.89
      Apr 25, 2024 12:49:11.238949060 CEST8049161139.59.65.89192.168.2.22
      Apr 25, 2024 12:49:41.252511024 CEST4916180192.168.2.22139.59.65.89
      Apr 25, 2024 12:49:41.612432003 CEST8049161139.59.65.89192.168.2.22
      Apr 25, 2024 12:49:55.872006893 CEST8049161139.59.65.89192.168.2.22
      Apr 25, 2024 12:49:55.872263908 CEST4916180192.168.2.22139.59.65.89
      Apr 25, 2024 12:50:25.885659933 CEST4916180192.168.2.22139.59.65.89
      Apr 25, 2024 12:50:26.245863914 CEST8049161139.59.65.89192.168.2.22
      TimestampSource PortDest PortSource IPDest IP
      Apr 25, 2024 12:48:39.738554001 CEST5456253192.168.2.228.8.8.8
      Apr 25, 2024 12:48:40.141366005 CEST53545628.8.8.8192.168.2.22
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Apr 25, 2024 12:48:39.738554001 CEST192.168.2.228.8.8.80x37ddStandard query (0)Z4uofnIZILkJsb.q91.latA (IP address)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Apr 25, 2024 12:48:40.141366005 CEST8.8.8.8192.168.2.220x37ddNo error (0)Z4uofnIZILkJsb.q91.lat139.59.65.89A (IP address)IN (0x0001)false
      • z4uofnizilkjsb.q91.lat
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.2249161139.59.65.89802556C:\Users\user\Desktop\xm393ns4.exe
      TimestampBytes transferredDirectionData
      Apr 25, 2024 12:48:40.510710001 CEST204OUTGET / HTTP/1.1
      Host: Z4uofnIZILkJsb.q91.lat
      User-Agent: If you would like to opt out, please fill out this form: https://forms.office.com/r/i1h9pFXbKA
      History: Z4uofnIZILkJsb
      Accept-Encoding: gzip
      Apr 25, 2024 12:48:40.869232893 CEST315INHTTP/1.1 502 Bad Gateway
      Server: nginx
      Date: Thu, 25 Apr 2024 10:48:40 GMT
      Content-Type: text/html; charset=utf-8
      Content-Length: 150
      Connection: keep-alive
      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
      Data Ascii: <html><head><title>502 Bad Gateway</title></head><body><center><h1>502 Bad Gateway</h1></center><hr><center>nginx</center></body></html>
      Apr 25, 2024 12:49:10.878772974 CEST6OUTData Raw: 00
      Data Ascii:
      Apr 25, 2024 12:49:41.252511024 CEST6OUTData Raw: 00
      Data Ascii:
      Apr 25, 2024 12:50:25.885659933 CEST6OUTData Raw: 00
      Data Ascii:


      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:12:48:36
      Start date:25/04/2024
      Path:C:\Users\user\Desktop\xm393ns4.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\xm393ns4.exe"
      Imagebase:0x400000
      File size:5'152'256 bytes
      MD5 hash:BF30F725D867F62D2020D4EA18A9140B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:2
      Start time:12:48:36
      Start date:25/04/2024
      Path:C:\Windows\SysWOW64\systeminfo.exe
      Wow64 process (32bit):true
      Commandline:systeminfo /fo csv
      Imagebase:0x300000
      File size:75'776 bytes
      MD5 hash:258B2ED54FC7F74E2FDCCE5861549C1A
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:4
      Start time:12:48:36
      Start date:25/04/2024
      Path:C:\Windows\SysWOW64\wbem\WmiPrvSE.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\sysWOW64\wbem\wmiprvse.exe -secured -Embedding
      Imagebase:0xa50000
      File size:355'328 bytes
      MD5 hash:54B7C43C2E89F5CE71B2C255C1CF35E2
      Has elevated privileges:true
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:5
      Start time:12:48:39
      Start date:25/04/2024
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:cmd.exe /c "del C:\Users\user\Desktop\xm393ns4.exe"
      Imagebase:0x4a0c0000
      File size:302'592 bytes
      MD5 hash:AD7B9C14083B52BC532FBA5948342B98
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Reset < >
        Strings
        • VirtualQuery for stack base failedforEachP: sched.safePointWait != 0schedule: spinning with local workruntime: g is running but p is notdoaddtimer: P already set in timertoo many references: cannot spliceunexpected runtime.netpoll error: invalid nested repetit, xrefs: 00435DBF
        • runtime.minit: duplicatehandle failed; errno=runtime: CreateWaitableTimerEx failed; errno=exitsyscall: syscall frame is no longer validunsafe.String: ptr is nil and len is not zerocannot send after transport endpoint shutdowncrypto/rsa: message too long for RS, xrefs: 00435E41
        • runtime.minit: duplicatehandle failed_cgo_notify_runtime_init_done missingstartTheWorld: inconsistent mp->nextpruntime: unexpected SPWRITE function all goroutines are asleep - deadlock!godebug: unexpected IncNonDefault of cannot exec a shared library directlyv, xrefs: 00435E75
        • runtime: VirtualQuery failed; errno=runtime: sudog with non-nil waitlinkruntime: mcall called on m->g0 stackstartm: P required for spinning=true) is not Grunnable or Gscanrunnableruntime: bad notifyList size - sync=accessed data from freed user arena runtime:, xrefs: 00435D8B
        • %, xrefs: 00435E7E
        • CreateWaitableTimerEx when creating timer failedruntime.preemptM: duplicatehandle failed; errno=runtime: waitforsingleobject wait_failed; errno=syscall: string with NUL passed to StringToUTF16x509: X25519 key encoded with illegal parametersx509: SAN uniformRes, xrefs: 00435E1A
        • bad g0 stackself-preempt [recovered]bad recoverybad g statusentersyscallwirep: p->m=) p->status=releasep: m= sysmonwait= preemptoff=cas64 failed m->gsignal=-byte limitruntime: sp=abi mismatch (sensitive)GetConsoleCPinvalid slothost is downillegal seekCypro_Mi, xrefs: 00435D64
        • runtime: CreateWaitableTimerEx failed; errno=exitsyscall: syscall frame is no longer validunsafe.String: ptr is nil and len is not zerocannot send after transport endpoint shutdowncrypto/rsa: message too long for RSA key sizex509: IP constraint contained inval, xrefs: 00435DE6
        Memory Dump Source
        • Source File: 00000000.00000002.601188326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.601185724.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.601221728.0000000000676000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.601251676.0000000000893000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.601254705.0000000000895000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.601257155.0000000000896000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.601259566.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.601261985.0000000000898000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.601264384.0000000000899000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.601268655.00000000008C4000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.601271363.00000000008CB000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.601273800.00000000008CC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.601273800.00000000008D4000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.601273800.00000000008D9000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.601273800.00000000008F4000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.601273800.00000000008FB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.601287437.00000000008FE000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.601289862.00000000008FF000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_xm393ns4.jbxd
        Similarity
        • API ID:
        • String ID: %$CreateWaitableTimerEx when creating timer failedruntime.preemptM: duplicatehandle failed; errno=runtime: waitforsingleobject wait_failed; errno=syscall: string with NUL passed to StringToUTF16x509: X25519 key encoded with illegal parametersx509: SAN uniformRes$VirtualQuery for stack base failedforEachP: sched.safePointWait != 0schedule: spinning with local workruntime: g is running but p is notdoaddtimer: P already set in timertoo many references: cannot spliceunexpected runtime.netpoll error: invalid nested repetit$bad g0 stackself-preempt [recovered]bad recoverybad g statusentersyscallwirep: p->m=) p->status=releasep: m= sysmonwait= preemptoff=cas64 failed m->gsignal=-byte limitruntime: sp=abi mismatch (sensitive)GetConsoleCPinvalid slothost is downillegal seekCypro_Mi$runtime.minit: duplicatehandle failed; errno=runtime: CreateWaitableTimerEx failed; errno=exitsyscall: syscall frame is no longer validunsafe.String: ptr is nil and len is not zerocannot send after transport endpoint shutdowncrypto/rsa: message too long for RS$runtime.minit: duplicatehandle failed_cgo_notify_runtime_init_done missingstartTheWorld: inconsistent mp->nextpruntime: unexpected SPWRITE function all goroutines are asleep - deadlock!godebug: unexpected IncNonDefault of cannot exec a shared library directlyv$runtime: CreateWaitableTimerEx failed; errno=exitsyscall: syscall frame is no longer validunsafe.String: ptr is nil and len is not zerocannot send after transport endpoint shutdowncrypto/rsa: message too long for RSA key sizex509: IP constraint contained inval$runtime: VirtualQuery failed; errno=runtime: sudog with non-nil waitlinkruntime: mcall called on m->g0 stackstartm: P required for spinning=true) is not Grunnable or Gscanrunnableruntime: bad notifyList size - sync=accessed data from freed user arena runtime:
        • API String ID: 0-3801092541
        • Opcode ID: 5ca386f4cd102169c39c0e80885f02d9a67b19b50178324815d906769be81ab8
        • Instruction ID: bdea31c7d9f9c34f107594a652fe7280374aa96744c91e6d84f976e38896e4e1
        • Opcode Fuzzy Hash: 5ca386f4cd102169c39c0e80885f02d9a67b19b50178324815d906769be81ab8
        • Instruction Fuzzy Hash: 8691D0B45097019FD300EF65D199B1ABBE0BF48708F01A92EE4988B352EB78D945CF5B
        Uniqueness

        Uniqueness Score: -1.00%

        Strings
        • m->p= p->m=SCHED curg= ctxt: min= max= (...) base CommonArabicBrahmiCarianChakmaCopticGothicHangulHatranHebrewKaithiKhojkiLepchaLycianLydianRejangSyriacTai_LeTangsaTangutTeluguThaanaWanchoYezidiempty rune1 rdtscppopcntLengthheaderAnswercmd/goSTREET<SHIFT><, xrefs: 00446297
        • p->status= in status idleprocs= gcwaiting= schedtick= timerslen= mallocing=bad timedivfloat64nan1float64nan2float64nan3float32nan2GOTRACEBACK) at entry+ (targetpc= , plugin: runtime: g : frame.sp=created by HTTPS_PROXYhttps_proxyNetShareAddNetShareDelbad mes, xrefs: 004462E3
        • releasep: m= sysmonwait= preemptoff=cas64 failed m->gsignal=-byte limitruntime: sp=abi mismatch (sensitive)GetConsoleCPinvalid slothost is downillegal seekCypro_MinoanMeetei_MayekPahawh_HmongSora_SompengSyloti_Nagrinot pollableInstAltMatchunexpected )altmatch, xrefs: 00446275
        • releasep: invalid argcheckdead: runnable gruntime: newstack at runtime: newstack sp=runtime: confused by pcHeader.textStart= timer data corruptionNetUserGetLocalGroupsGetProfilesDirectoryWlink has been severedpackage not installedblock device requiredstate no, xrefs: 0044632D
        • releasep: invalid p statecheckdead: no p for timercheckdead: no m for timerunknown sigtramp callbackunexpected fault address missing stack in newstackbad status in shrinkstackmissing traceGCSweepStartresource deadlock avoidedoperation now in progressno buffer , xrefs: 00446317
        Memory Dump Source
        • Source File: 00000000.00000002.601188326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.601185724.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.601221728.0000000000676000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.601251676.0000000000893000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.601254705.0000000000895000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.601257155.0000000000896000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.601259566.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.601261985.0000000000898000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.601264384.0000000000899000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.601268655.00000000008C4000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.601271363.00000000008CB000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.601273800.00000000008CC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.601273800.00000000008D4000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.601273800.00000000008D9000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.601273800.00000000008F4000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.601273800.00000000008FB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.601287437.00000000008FE000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.601289862.00000000008FF000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_xm393ns4.jbxd
        Similarity
        • API ID:
        • String ID: m->p= p->m=SCHED curg= ctxt: min= max= (...) base CommonArabicBrahmiCarianChakmaCopticGothicHangulHatranHebrewKaithiKhojkiLepchaLycianLydianRejangSyriacTai_LeTangsaTangutTeluguThaanaWanchoYezidiempty rune1 rdtscppopcntLengthheaderAnswercmd/goSTREET<SHIFT><$ p->status= in status idleprocs= gcwaiting= schedtick= timerslen= mallocing=bad timedivfloat64nan1float64nan2float64nan3float32nan2GOTRACEBACK) at entry+ (targetpc= , plugin: runtime: g : frame.sp=created by HTTPS_PROXYhttps_proxyNetShareAddNetShareDelbad mes$releasep: invalid argcheckdead: runnable gruntime: newstack at runtime: newstack sp=runtime: confused by pcHeader.textStart= timer data corruptionNetUserGetLocalGroupsGetProfilesDirectoryWlink has been severedpackage not installedblock device requiredstate no$releasep: invalid p statecheckdead: no p for timercheckdead: no m for timerunknown sigtramp callbackunexpected fault address missing stack in newstackbad status in shrinkstackmissing traceGCSweepStartresource deadlock avoidedoperation now in progressno buffer $releasep: m= sysmonwait= preemptoff=cas64 failed m->gsignal=-byte limitruntime: sp=abi mismatch (sensitive)GetConsoleCPinvalid slothost is downillegal seekCypro_MinoanMeetei_MayekPahawh_HmongSora_SompengSyloti_Nagrinot pollableInstAltMatchunexpected )altmatch
        • API String ID: 0-1527155338
        • Opcode ID: bf8047a1b940d3cc2f78fc14a66b244c35610c04586989f1c8f76c9d8bbfd53c
        • Instruction ID: 2d37fd7b8d1b559f70236babf613e6727756f830b26b53c8f080941db6270096
        • Opcode Fuzzy Hash: bf8047a1b940d3cc2f78fc14a66b244c35610c04586989f1c8f76c9d8bbfd53c
        • Instruction Fuzzy Hash: 1441D2B45097058FD300EF65D195B1ABBE1FF88308F45996EE89887312D778D888CBA7
        Uniqueness

        Uniqueness Score: -1.00%