Click to jump to signature section
Source: NoBackend.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 4x nop then cmp rdx, rbx | 0_2_00B5B360 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 4x nop then lock or byte ptr [rdx], r8L | 0_2_00B70460 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 4x nop then shr rdi, 0Dh | 0_2_00B7AB00 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 4x nop then cmp rdx, 40h | 0_2_00B6FD20 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 4x nop then shr r10, 0Dh | 0_2_00B7BF80 |
Source: Joe Sandbox View | IP Address: 162.159.136.232 162.159.136.232 |
Source: Joe Sandbox View | IP Address: 31.14.70.245 31.14.70.245 |
Source: unknown | Network traffic detected: HTTP traffic on port 49708 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49706 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49707 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49705 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49704 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49708 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49707 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49706 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49705 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49704 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: NoBackend.exe | String found in binary or memory: https://%s.go%s/uploadFileinvalid |
Source: NoBackend.exe, 00000000.00000002.2073335904.000000C000348000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: NoBackend.exe | String found in binary or memory: https://api.gapple.pw/cors/profile/2006-01-02T15:04:05.999999999Z07:00177635683940025046467781066894 |
Source: NoBackend.exe, 00000000.00000002.2073335904.000000C0000AA000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://apiv2.gofile.io |
Source: NoBackend.exe, 00000000.00000002.2073335904.000000C0000EC000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://apiv2.gofile.io/getServer |
Source: NoBackend.exe, 00000000.00000002.2073335904.000000C0000B2000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://apiv2.gofile.io/getServerGet |
Source: NoBackend.exe, 00000000.00000002.2073335904.000000C0000B2000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://apiv2.gofile.io/getServeraldi/User |
Source: NoBackend.exe | String found in binary or memory: https://apiv2.gokian |
Source: NoBackend.exe | String found in binary or memory: https://cdn.discordapp.com/avatars/%s/%s.gifhttps://cdn.discordapp.com/avatars/%s/%s.pngmult128bitPo |
Source: NoBackend.exe, 00000000.00000002.2073335904.000000C000348000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: NoBackend.exe, 00000000.00000002.2073335904.000000C000348000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: NoBackend.exe, 00000000.00000002.2073335904.000000C000348000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: NoBackend.exe | String found in binary or memory: https://discord.com/api/v6/users/ |
Source: NoBackend.exe | String found in binary or memory: https://discord.com/api/v8/guilds/%s/i |
Source: NoBackend.exe | String found in binary or memory: https://discord.com/api/v8/users/ |
Source: NoBackend.exe | String found in binary or memory: https://discord.com/api/v9/users/ |
Source: NoBackend.exe | String found in binary or memory: https://discord.com/api/webhooks/1172270413225660506/VdkSArCf5XQSdMw_8XT8p0tZufBvp2m7IFjyTK4cbnGOObP |
Source: NoBackend.exe, 00000000.00000002.2073335904.000000C000348000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: NoBackend.exe, 00000000.00000002.2073335904.000000C000348000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: NoBackend.exe, 00000000.00000002.2073335904.000000C000348000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: NoBackend.exe | String found in binary or memory: https://goCreateFile/dev/stdin12207031256103515625ParseFloatcomplex128t.Kind |
Source: NoBackend.exe, 00000000.00000002.2073335904.000000C000102000.00000004.00001000.00020000.00000000.sdmp, NoBackend.exe, 00000000.00000002.2076962939.000000C000480000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://gofile.io/d/ |
Source: NoBackend.exe, 00000000.00000002.2076774521.000000C00040E000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://gofile.io/d/6uo6Pz |
Source: NoBackend.exe, 00000000.00000002.2073335904.000000C000114000.00000004.00001000.00020000.00000000.sdmp, NoBackend.exe, 00000000.00000002.2073335904.000000C00015A000.00000004.00001000.00020000.00000000.sdmp, NoBackend.exe, 00000000.00000002.2073335904.000000C000102000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://gofile.io/d/6uo6Pz) |
Source: NoBackend.exe, 00000000.00000002.2073335904.000000C00010C000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://gofile.io/d/6uo6Pzeveldb |
Source: NoBackend.exe, 00000000.00000002.2073335904.000000C000092000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://gofile.io/uploadFiles |
Source: NoBackend.exe, 00000000.00000002.2073335904.000000C000092000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://gofile.io/uploadFilesapiv2.gofile.ioQ |
Source: NoBackend.exe, 00000000.00000002.2073335904.000000C0000AA000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://gofile.iok |
Source: NoBackend.exe, 00000000.00000002.2073335904.000000C0000AA000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://gofile.iokapiv2.gofile.io:443apiv2.gofile.io:443tcpapiv2.gofile.iohttps://apiv2.gofile.ioloo |
Source: NoBackend.exe, 00000000.00000002.2076962939.000000C000480000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://i.ibb.co/hVY5sGg/logo.png |
Source: NoBackend.exe | String found in binary or memory: https://i.ibb.co/hVY5sGg/logo.png/Google/Chrome |
Source: NoBackend.exe, 00000000.00000002.2073335904.000000C0000B2000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://store4.gofile.io/uploadFile/ |
Source: NoBackend.exe, 00000000.00000002.2073335904.000000C0000B2000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://store4.gofile.io/uploadFile/store4.gofile.io |
Source: NoBackend.exe, 00000000.00000002.2073335904.000000C000348000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: NoBackend.exe, 00000000.00000002.2073335904.000000C000348000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: NoBackend.exe | String found in binary or memory: https://youtu.be/dQw4w9WgXcQfailed |
Source: unknown | HTTP traffic detected: POST /api/webhooks/1172270413225660506/VdkSArCf5XQSdMw_8XT8p0tZufBvp2m7IFjyTK4cbnGOObPc8eb4Yo7KHhtquCjXx344 HTTP/1.1Host: discord.comUser-Agent: Go-http-client/1.1Content-Length: 565Content-Type: application/jsonAccept-Encoding: gzip |
Source: LGPKVAOAL.zip.0.dr | Zip Entry: encrypted |
Source: LGPKVAOAL.zip.0.dr | Zip Entry: encrypted |
Source: LGPKVAOAL.zip.0.dr | Zip Entry: encrypted |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B78000 | 0_2_00B78000 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B5C1E0 | 0_2_00B5C1E0 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B77360 | 0_2_00B77360 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B8E500 | 0_2_00B8E500 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B9BBE0 | 0_2_00B9BBE0 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B94BC0 | 0_2_00B94BC0 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B84C20 | 0_2_00B84C20 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B5CD80 | 0_2_00B5CD80 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B74EC0 | 0_2_00B74EC0 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B88220 | 0_2_00B88220 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B67200 | 0_2_00B67200 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B7D3A0 | 0_2_00B7D3A0 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00BB4389 | 0_2_00BB4389 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B813C0 | 0_2_00B813C0 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00BBE360 | 0_2_00BBE360 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00BB14C0 | 0_2_00BB14C0 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00BCC420 | 0_2_00BCC420 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00BCE440 | 0_2_00BCE440 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00BDB440 | 0_2_00BDB440 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00BDC5E0 | 0_2_00BDC5E0 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00BC6520 | 0_2_00BC6520 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B6A500 | 0_2_00B6A500 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00BA66A0 | 0_2_00BA66A0 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B98680 | 0_2_00B98680 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B706C0 | 0_2_00B706C0 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00BC5660 | 0_2_00BC5660 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00BC8700 | 0_2_00BC8700 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B6A8A0 | 0_2_00B6A8A0 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B5D880 | 0_2_00B5D880 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00BC08C0 | 0_2_00BC08C0 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00BA0820 | 0_2_00BA0820 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00BBEAA0 | 0_2_00BBEAA0 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00BC6A00 | 0_2_00BC6A00 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00BEAA00 | 0_2_00BEAA00 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B88A60 | 0_2_00B88A60 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00BE6A5A | 0_2_00BE6A5A |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00BE2BA0 | 0_2_00BE2BA0 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B7AB00 | 0_2_00B7AB00 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00BDAB40 | 0_2_00BDAB40 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B8FCC0 | 0_2_00B8FCC0 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B59C00 | 0_2_00B59C00 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00BCBC00 | 0_2_00BCBC00 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00BC8DC0 | 0_2_00BC8DC0 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B6DD20 | 0_2_00B6DD20 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B69EE0 | 0_2_00B69EE0 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B71E40 | 0_2_00B71E40 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B8BE40 | 0_2_00B8BE40 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B7BF80 | 0_2_00B7BF80 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B9EF80 | 0_2_00B9EF80 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B7AFC0 | 0_2_00B7AFC0 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00BC8FC0 | 0_2_00BC8FC0 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B64F20 | 0_2_00B64F20 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B8EF00 | 0_2_00B8EF00 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00BA9F60 | 0_2_00BA9F60 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00BD6F60 | 0_2_00BD6F60 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00BCDF40 | 0_2_00BCDF40 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: String function: 00B875A0 appears 577 times | |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: String function: 00B897C0 appears 580 times | |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: String function: 00B62C20 appears 54 times | |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: String function: 00B9FA20 appears 37 times | |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: String function: 00B88FA0 appears 63 times | |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: String function: 00B9F980 appears 34 times | |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: String function: 00B5AEA0 appears 36 times | |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: String function: 00B9FAE0 appears 40 times | |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: String function: 00B87680 appears 32 times | |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B82080 LoadLibraryExW,RtlAddVectoredContinueHandler,LoadLibraryExW,LoadLibraryExW,NtWaitForSingleObject,RtlGetCurrentPeb,RtlGetNtVersionNumbers,LoadLibraryExW,timeBeginPeriod,timeEndPeriod,LoadLibraryExW,WSAGetOverlappedResult, | 0_2_00B82080 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B95060 SetWaitableTimer,NtWaitForSingleObject, | 0_2_00B95060 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B8B620 SetWaitableTimer,NtWaitForSingleObject, | 0_2_00B8B620 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B8B7E0 SetWaitableTimer,NtWaitForSingleObject, | 0_2_00B8B7E0 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B8B700 SetWaitableTimer,NtWaitForSingleObject, | 0_2_00B8B700 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00B8B8C0 SetWaitableTimer,NtWaitForSingleObject, | 0_2_00B8B8C0 |
Source: C:\Users\user\Desktop\NoBackend.exe | Code function: 0_2_00BB8E20 NtWaitForSingleObject, | 0_2_00BB8E20 |
Source: NoBackend.exe | Static PE information: Section: /19 ZLIB complexity 0.9996098037870472 |
Source: NoBackend.exe | Static PE information: Section: /32 ZLIB complexity 0.9981072809278351 |
Source: NoBackend.exe | Static PE information: Section: /65 ZLIB complexity 0.9989415886916186 |
Source: NoBackend.exe | Static PE information: Section: /78 ZLIB complexity 0.9932583623158756 |
Source: NoBackend.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\NoBackend.exe | File opened: C:\Windows\system32\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 | Jump to behavior |
Source: NoBackend.exe | String found in binary or memory: f expNNWindowedx509: invalid RSA public keyx509: invalid DSA public keyx509: invalid DSA parameterscurrent time %s is before %spending ASN.1 child too longinvalid P224Element encodinginvalid P384Element encodinginvalid P521Element encoding/launcher_msa_credent |
Source: NoBackend.exe | String found in binary or memory: ion errorx509: invalid ECDSA parametersx509: SAN dNSName is malformedx509: malformed issuerUniqueIDtrailing garbage after addresstransform: short source bufferfmt: unknown base; can't happen/DesktopApps/Minecraft/LauncherW. Central Africa Standard TimeCentral |
Source: NoBackend.exe | String found in binary or memory: alformed subjectUniqueIDx509: certificate is valid for crypto/ecdh: invalid public keyzone must be a non-empty string/DesktopApps/Minecraft/Launcher/: day-of-year does not match day/%PROFILE%/Local Storage/leveldbselect url, title from bookmarksselect name, va |
Source: NoBackend.exe | String found in binary or memory: odinginvalid P256 compressed point encodinginvalid P384 compressed point encodinginvalid P521 compressed point encodingGODEBUG sys/cpu: unknown cpu feature "/launcher_accounts_microsoft_store.json2006-01-02 15:04:05.999999999 -0700 MST<:hypersquad_events:96870 |
Source: NoBackend.exe | String found in binary or memory: net/addrselect.go |
Source: NoBackend.exe | String found in binary or memory: or parsing regexp: I'm done :yawning_face:<invalid reflect.Value>/.feather/accounts.json/launcher_accounts.json" not found in registryE. Africa Standard TimeTocantins Standard TimeArgentina Standard TimeVenezuela Standard TimeGreenland Standard TimeSri Lanka S |
Source: NoBackend.exe | String found in binary or memory: Billing Address ID: \Browser\autofill.txt/Exodus/exodus.walletunsupported operation186264514923095703125931322574615478515625bad type in compare: of unexported methodunexpected value stepreflect.Value.SetZeroreflect.Value.Pointerreflect.Value.SetUintafter top-level valuein string escape codehttp: nil Request.URLUNKNOWN_FRAME_TYPE_%dframe_ping_has_streamRoundTrip failure: %vUnhandled Setting: %vnet/http: nil Contextunknown address type command not supportedPrecondition RequiredInternal Server Errorexec: already startedAnatolian_HieroglyphsInscriptional_Pahlavitrace/breakpoint trapuser defined signal 1user defined signal 2link has been severedpackage not installedblock device requiredstate not recoverableread-only file systemstale NFS file handleReadDirectoryChangesWNetGetJoinInformationnegative shift amountconcurrent map writes/gc/heap/allocs:bytesruntime: work.nwait= previous allocCount=, levelBits[level] = runtime: searchIdx = defer on system stackpanic on system stackasync stack too largestartm: m is spinningstartlockedm: m has pfindrunnable: wrong ppreempt at unknown pcreleasep: invalid argcheckdead: runnable gruntime: newstack at runtime: newstack sp=runtime: confused by pcHeader.textStart= timer data corruptiondecryption failed: %wsequence tag mismatchAdjustTokenPrivilegesLookupPrivilegeValueWNetUserGetLocalGroupsGetProfilesDirectoryWkey is not comparabledecompression failureunsupported extensionlocalhost.localdomainbufio: negative countinvalid NumericStringx509: invalid versionIPv4 address too longunexpected slice sizeinvalid named captureinvalid scalar length\DesktopApps\MinecraftSao Tome Standard TimeAleutian Standard TimeParaguay Standard TimeMountain Standard TimeAtlantic Standard TimePakistan Standard TimeSakhalin Standard TimeGeorgian Standard TimeCaucasus Standard TimeTasmania Standard TimeDateline Standard TimeHawaiian Standard Time/Local Storage/leveldb\Browser\passwords.txt\Browser\bookmarks.txtPartnered_Server_OwnerVerified_Bot_Developerreflectlite.Value.Type4656612873077392578125unexpected method stepreflect.Value.MapIndexreflect.Value.SetFloat to array with length into Go struct field json: unknown field %qhttp2: frame too largewrite on closed bufferframe_data_pad_too_bigaccess-control-max-ageinvalid Trailer key %qmalformed HTTP versionUnsupported Media TypeDEBUG_HTTP2_GOROUTINESMAX_CONCURRENT_STREAMSInscriptional_ParthianNyiakeng_Puachue_Hmongargument list too longaddress already in usenetwork is unreac |