Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
EeXJoO1J62.exe

Overview

General Information

Sample name:EeXJoO1J62.exe
renamed because original name is a hash value
Original sample name:6c7dfceb22fe0ef78835f29e53ae6b3e.exe
Analysis ID:1569807
MD5:6c7dfceb22fe0ef78835f29e53ae6b3e
SHA1:c8b290b0ec67a3cadfa6766cf1e630414c1c61c1
SHA256:a766923ebb53cbff64f0603af9f07a4a5076aeff4d3416b7c817905a1a1c0a3f
Tags:exeuser-abuse_ch
Infos:

Detection

Discord Rat
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Discord Rat
.NET source code contains potential unpacker
AI detected suspicious sample
Contains functionality to disable the Task Manager (.Net Source)
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Detected potential crypto function
Enables debug privileges
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • EeXJoO1J62.exe (PID: 5348 cmdline: "C:\Users\user\Desktop\EeXJoO1J62.exe" MD5: 6C7DFCEB22FE0EF78835F29E53AE6B3E)
    • WerFault.exe (PID: 7384 cmdline: C:\Windows\system32\WerFault.exe -u -p 5348 -s 2332 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
EeXJoO1J62.exeJoeSecurity_DiscordRatYara detected Discord RatJoe Security
    SourceRuleDescriptionAuthorStrings
    00000005.00000000.1277758910.0000029CAE272000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_DiscordRatYara detected Discord RatJoe Security
      Process Memory Space: EeXJoO1J62.exe PID: 5348JoeSecurity_DiscordRatYara detected Discord RatJoe Security
        SourceRuleDescriptionAuthorStrings
        5.0.EeXJoO1J62.exe.29cae270000.0.unpackJoeSecurity_DiscordRatYara detected Discord RatJoe Security
          No Sigma rule has matched
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: EeXJoO1J62.exeAvira: detected
          Source: EeXJoO1J62.exeReversingLabs: Detection: 71%
          Source: Yara matchFile source: EeXJoO1J62.exe, type: SAMPLE
          Source: Yara matchFile source: 5.0.EeXJoO1J62.exe.29cae270000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000000.1277758910.0000029CAE272000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: EeXJoO1J62.exe PID: 5348, type: MEMORYSTR
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 92.2% probability
          Source: EeXJoO1J62.exeJoe Sandbox ML: detected
          Source: unknownHTTPS traffic detected: 162.159.136.234:443 -> 192.168.2.11:49708 version: TLS 1.2
          Source: EeXJoO1J62.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: EeXJoO1J62.exe, 00000005.00000002.1578769033.0000029CC8991000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: pC:\Users\user\Desktop\EeXJoO1J62.PDB source: EeXJoO1J62.exe, 00000005.00000002.1577385395.000000BA5B1F1000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: System.Xml.ni.pdb source: WERCBB2.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: EeXJoO1J62.exe, 00000005.00000002.1578769033.0000029CC8991000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.ni.pdbRSDS source: WERCBB2.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Users\user\Desktop\EeXJoO1J62.PDB9b source: EeXJoO1J62.exe, 00000005.00000002.1578769033.0000029CC8A17000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Configuration.ni.pdb source: WERCBB2.tmp.dmp.10.dr
          Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WERCBB2.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Windows\mscorlib.pdbU source: EeXJoO1J62.exe, 00000005.00000002.1578769033.0000029CC8991000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Configuration.pdb source: WERCBB2.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Windows\System.pdb source: EeXJoO1J62.exe, 00000005.00000002.1578769033.0000029CC8991000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Xml.pdb source: WERCBB2.tmp.dmp.10.dr
          Source: Binary string: System.pdb source: WERCBB2.tmp.dmp.10.dr
          Source: Binary string: System.Xml.ni.pdbRSDS# source: WERCBB2.tmp.dmp.10.dr
          Source: Binary string: m.pdbp source: EeXJoO1J62.exe, 00000005.00000002.1578769033.0000029CC8991000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Core.ni.pdb source: WERCBB2.tmp.dmp.10.dr
          Source: Binary string: System.Web.Extensions.pdb source: WERCBB2.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: EeXJoO1J62.exe, 00000005.00000002.1578769033.0000029CC8991000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\dll\System.pdb source: EeXJoO1J62.exe, 00000005.00000002.1578769033.0000029CC8991000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: mscorlib.pdb source: WERCBB2.tmp.dmp.10.dr
          Source: Binary string: b77a5c561934e089\mscorlib.pdb= source: EeXJoO1J62.exe, 00000005.00000002.1577385395.000000BA5B1F1000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: EeXJoO1J62.exe, 00000005.00000002.1578769033.0000029CC8A17000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Web.Extensions.pdbp source: WERCBB2.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: EeXJoO1J62.exe, 00000005.00000002.1578769033.0000029CC8991000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: mscorlib.ni.pdb source: WERCBB2.tmp.dmp.10.dr
          Source: Binary string: System.pdb(\Q source: EeXJoO1J62.exe, 00000005.00000002.1578769033.0000029CC8A17000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\mscorlib.pdb source: EeXJoO1J62.exe, 00000005.00000002.1578769033.0000029CC8991000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Core.pdb source: WERCBB2.tmp.dmp.10.dr
          Source: Binary string: C:\Users\user\Desktop\EeXJoO1J62.PDB source: EeXJoO1J62.exe, 00000005.00000002.1577385395.000000BA5B1F1000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: EeXJoO1J62.PDB source: EeXJoO1J62.exe, 00000005.00000002.1577385395.000000BA5B1F1000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERCBB2.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: EeXJoO1J62.exe, 00000005.00000002.1578769033.0000029CC8A17000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: indoC:\Windows\mscorlib.pdb source: EeXJoO1J62.exe, 00000005.00000002.1577385395.000000BA5B1F1000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: System.ni.pdb source: WERCBB2.tmp.dmp.10.dr
          Source: Binary string: System.Core.ni.pdbRSDS source: WERCBB2.tmp.dmp.10.dr
          Source: global trafficHTTP traffic detected: GET /?v=9&encording=json HTTP/1.1Connection: Upgrade,Keep-AliveUpgrade: websocketSec-WebSocket-Key: LIAfAmPHO7MZvdbGNUjUIA==Sec-WebSocket-Version: 13Host: gateway.discord.gg
          Source: Joe Sandbox ViewIP Address: 162.159.136.234 162.159.136.234
          Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficHTTP traffic detected: GET /?v=9&encording=json HTTP/1.1Connection: Upgrade,Keep-AliveUpgrade: websocketSec-WebSocket-Key: LIAfAmPHO7MZvdbGNUjUIA==Sec-WebSocket-Version: 13Host: gateway.discord.gg
          Source: global trafficDNS traffic detected: DNS query: gateway.discord.gg
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 06 Dec 2024 09:17:31 GMTContent-Length: 0Connection: closeCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HBv8kCeayGbSWq83pLURg8O3N%2BCCAP7700C1t4UkzRDbQhn1%2F6Nxoztt%2FqCGLZccD7heg3sKnKx7UJa71SJDRBpPhEHHurzXjU%2BJ0Sg3UlAt1mHoDzLc3ke4g5gytfzaZZbG0Q%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Strict-Transport-Security: max-age=31536000; includeSubDomains; preloadX-Content-Type-Options: nosniffServer: cloudflareCF-RAY: 8edb2eee9e13330c-EWR
          Source: EeXJoO1J62.exe, 00000005.00000002.1578328505.0000029CAFFD5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://gateway.discord.gg
          Source: EeXJoO1J62.exe, 00000005.00000002.1578328505.0000029CAFF21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: Amcache.hve.10.drString found in binary or memory: http://upx.sf.net
          Source: EeXJoO1J62.exeString found in binary or memory: http://www.google.com/maps/place/
          Source: EeXJoO1J62.exeString found in binary or memory: https://discord.com/api/v9/channels/
          Source: EeXJoO1J62.exeString found in binary or memory: https://discord.com/api/v9/guilds/
          Source: EeXJoO1J62.exeString found in binary or memory: https://file.io/
          Source: EeXJoO1J62.exe, 00000005.00000002.1578328505.0000029CAFFB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gateway.discord.gg
          Source: EeXJoO1J62.exe, 00000005.00000002.1578328505.0000029CAFFB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gateway.discord.gg/?v=9&encording=json
          Source: EeXJoO1J62.exe, 00000005.00000002.1578328505.0000029CAFFB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gateway.discord.gg/?v=9&encording=jsonX
          Source: EeXJoO1J62.exe, 00000005.00000002.1578328505.0000029CAFF21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gateway.discord.gg:443/?v=9&encording=json
          Source: EeXJoO1J62.exeString found in binary or memory: https://geolocation-db.com/json
          Source: EeXJoO1J62.exeString found in binary or memory: https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/PasswordSte
          Source: EeXJoO1J62.exeString found in binary or memory: https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/Token%20gra
          Source: EeXJoO1J62.exeString found in binary or memory: https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/Webcam.dll
          Source: EeXJoO1J62.exeString found in binary or memory: https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/rootkit.dll
          Source: EeXJoO1J62.exeString found in binary or memory: https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/unrootkit.d
          Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
          Source: unknownHTTPS traffic detected: 162.159.136.234:443 -> 192.168.2.11:49708 version: TLS 1.2

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: EeXJoO1J62.exe, type: SAMPLE
          Source: Yara matchFile source: 5.0.EeXJoO1J62.exe.29cae270000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000000.1277758910.0000029CAE272000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: EeXJoO1J62.exe PID: 5348, type: MEMORYSTR
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeCode function: 5_2_00007FFE7E1312E05_2_00007FFE7E1312E0
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeCode function: 5_2_00007FFE7E1312D15_2_00007FFE7E1312D1
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeCode function: 5_2_00007FFE7E1313FB5_2_00007FFE7E1313FB
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeCode function: 5_2_00007FFE7E1313D35_2_00007FFE7E1313D3
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5348 -s 2332
          Source: EeXJoO1J62.exeStatic PE information: No import functions for PE file found
          Source: EeXJoO1J62.exe, 00000005.00000000.1277758910.0000029CAE286000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenameDiscord rat.exe8 vs EeXJoO1J62.exe
          Source: EeXJoO1J62.exeBinary or memory string: OriginalFilenameDiscord rat.exe8 vs EeXJoO1J62.exe
          Source: classification engineClassification label: mal80.troj.evad.winEXE@2/5@1/1
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeMutant created: NULL
          Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5348
          Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\91c03ba9-ca1b-447d-8d43-e403c862b65fJump to behavior
          Source: EeXJoO1J62.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: EeXJoO1J62.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: EeXJoO1J62.exeReversingLabs: Detection: 71%
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeFile read: C:\Users\user\Desktop\EeXJoO1J62.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\EeXJoO1J62.exe "C:\Users\user\Desktop\EeXJoO1J62.exe"
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5348 -s 2332
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: websocket.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: rasapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: rasman.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: rtutils.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
          Source: EeXJoO1J62.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: EeXJoO1J62.exeStatic PE information: Image base 0x140000000 > 0x60000000
          Source: EeXJoO1J62.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: EeXJoO1J62.exe, 00000005.00000002.1578769033.0000029CC8991000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: pC:\Users\user\Desktop\EeXJoO1J62.PDB source: EeXJoO1J62.exe, 00000005.00000002.1577385395.000000BA5B1F1000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: System.Xml.ni.pdb source: WERCBB2.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: EeXJoO1J62.exe, 00000005.00000002.1578769033.0000029CC8991000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.ni.pdbRSDS source: WERCBB2.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Users\user\Desktop\EeXJoO1J62.PDB9b source: EeXJoO1J62.exe, 00000005.00000002.1578769033.0000029CC8A17000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Configuration.ni.pdb source: WERCBB2.tmp.dmp.10.dr
          Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WERCBB2.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Windows\mscorlib.pdbU source: EeXJoO1J62.exe, 00000005.00000002.1578769033.0000029CC8991000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Configuration.pdb source: WERCBB2.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Windows\System.pdb source: EeXJoO1J62.exe, 00000005.00000002.1578769033.0000029CC8991000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Xml.pdb source: WERCBB2.tmp.dmp.10.dr
          Source: Binary string: System.pdb source: WERCBB2.tmp.dmp.10.dr
          Source: Binary string: System.Xml.ni.pdbRSDS# source: WERCBB2.tmp.dmp.10.dr
          Source: Binary string: m.pdbp source: EeXJoO1J62.exe, 00000005.00000002.1578769033.0000029CC8991000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Core.ni.pdb source: WERCBB2.tmp.dmp.10.dr
          Source: Binary string: System.Web.Extensions.pdb source: WERCBB2.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: EeXJoO1J62.exe, 00000005.00000002.1578769033.0000029CC8991000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\dll\System.pdb source: EeXJoO1J62.exe, 00000005.00000002.1578769033.0000029CC8991000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: mscorlib.pdb source: WERCBB2.tmp.dmp.10.dr
          Source: Binary string: b77a5c561934e089\mscorlib.pdb= source: EeXJoO1J62.exe, 00000005.00000002.1577385395.000000BA5B1F1000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: EeXJoO1J62.exe, 00000005.00000002.1578769033.0000029CC8A17000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Web.Extensions.pdbp source: WERCBB2.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: EeXJoO1J62.exe, 00000005.00000002.1578769033.0000029CC8991000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: mscorlib.ni.pdb source: WERCBB2.tmp.dmp.10.dr
          Source: Binary string: System.pdb(\Q source: EeXJoO1J62.exe, 00000005.00000002.1578769033.0000029CC8A17000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\mscorlib.pdb source: EeXJoO1J62.exe, 00000005.00000002.1578769033.0000029CC8991000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Core.pdb source: WERCBB2.tmp.dmp.10.dr
          Source: Binary string: C:\Users\user\Desktop\EeXJoO1J62.PDB source: EeXJoO1J62.exe, 00000005.00000002.1577385395.000000BA5B1F1000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: EeXJoO1J62.PDB source: EeXJoO1J62.exe, 00000005.00000002.1577385395.000000BA5B1F1000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERCBB2.tmp.dmp.10.dr
          Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: EeXJoO1J62.exe, 00000005.00000002.1578769033.0000029CC8A17000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: indoC:\Windows\mscorlib.pdb source: EeXJoO1J62.exe, 00000005.00000002.1577385395.000000BA5B1F1000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: System.ni.pdb source: WERCBB2.tmp.dmp.10.dr
          Source: Binary string: System.Core.ni.pdbRSDS source: WERCBB2.tmp.dmp.10.dr

          Data Obfuscation

          barindex
          Source: EeXJoO1J62.exe, Program.cs.Net Code: LoadDll System.Reflection.Assembly.Load(byte[])
          Source: EeXJoO1J62.exe, Program.cs.Net Code: password
          Source: EeXJoO1J62.exe, Program.cs.Net Code: webcampic
          Source: EeXJoO1J62.exe, Program.cs.Net Code: select_cam
          Source: EeXJoO1J62.exe, Program.cs.Net Code: get_cams
          Source: EeXJoO1J62.exe, Program.cs.Net Code: get_tokens
          Source: EeXJoO1J62.exeStatic PE information: 0xD6D709DC [Mon Mar 20 18:56:28 2084 UTC]
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeCode function: 5_2_00007FFE7E1300BD pushad ; iretd 5_2_00007FFE7E1300C1
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeMemory allocated: 29CAFD70000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeMemory allocated: 29CC7F20000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exe TID: 5752Thread sleep count: 314 > 30Jump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exe TID: 5116Thread sleep count: 174 > 30Jump to behavior
          Source: Amcache.hve.10.drBinary or memory string: VMware
          Source: Amcache.hve.10.drBinary or memory string: VMware-42 27 b7 a3 1e b0 86 f3-0a fe 06 07 d0 80 07 92
          Source: Amcache.hve.10.drBinary or memory string: VMware Virtual USB Mouse
          Source: Amcache.hve.10.drBinary or memory string: vmci.syshbin
          Source: Amcache.hve.10.drBinary or memory string: VMware, Inc.
          Source: Amcache.hve.10.drBinary or memory string: VMware20,1hbin@
          Source: Amcache.hve.10.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
          Source: Amcache.hve.10.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
          Source: Amcache.hve.10.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
          Source: Amcache.hve.10.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
          Source: Amcache.hve.10.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
          Source: Amcache.hve.10.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
          Source: Amcache.hve.10.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
          Source: Amcache.hve.10.drBinary or memory string: vmci.sys
          Source: Amcache.hve.10.drBinary or memory string: vmci.syshbin`
          Source: EeXJoO1J62.exe, 00000005.00000002.1577846920.0000029CAE499000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllJJ"
          Source: Amcache.hve.10.drBinary or memory string: \driver\vmci,\driver\pci
          Source: Amcache.hve.10.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
          Source: Amcache.hve.10.drBinary or memory string: VMware20,1
          Source: Amcache.hve.10.drBinary or memory string: Microsoft Hyper-V Generation Counter
          Source: Amcache.hve.10.drBinary or memory string: NECVMWar VMware SATA CD00
          Source: Amcache.hve.10.drBinary or memory string: VMware Virtual disk SCSI Disk Device
          Source: Amcache.hve.10.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
          Source: Amcache.hve.10.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
          Source: Amcache.hve.10.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
          Source: Amcache.hve.10.drBinary or memory string: VMware PCI VMCI Bus Device
          Source: Amcache.hve.10.drBinary or memory string: VMware VMCI Bus Device
          Source: Amcache.hve.10.drBinary or memory string: VMware Virtual RAM
          Source: Amcache.hve.10.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
          Source: Amcache.hve.10.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess queried: DebugPortJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess queried: DebugPortJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeMemory allocated: page read and write | page guardJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeQueries volume information: C:\Users\user\Desktop\EeXJoO1J62.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\EeXJoO1J62.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Lowering of HIPS / PFW / Operating System Security Settings

          barindex
          Source: EeXJoO1J62.exe, Program.cs.Net Code: DisableTaskManager
          Source: Amcache.hve.10.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
          Source: Amcache.hve.10.drBinary or memory string: msmpeng.exe
          Source: Amcache.hve.10.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
          Source: Amcache.hve.10.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
          Source: Amcache.hve.10.drBinary or memory string: MsMpEng.exe

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: EeXJoO1J62.exe, type: SAMPLE
          Source: Yara matchFile source: 5.0.EeXJoO1J62.exe.29cae270000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000000.1277758910.0000029CAE272000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: EeXJoO1J62.exe PID: 5348, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: EeXJoO1J62.exe, type: SAMPLE
          Source: Yara matchFile source: 5.0.EeXJoO1J62.exe.29cae270000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000000.1277758910.0000029CAE272000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: EeXJoO1J62.exe PID: 5348, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
          DLL Side-Loading
          1
          Process Injection
          3
          Virtualization/Sandbox Evasion
          OS Credential Dumping1
          Query Registry
          Remote Services1
          Archive Collected Data
          11
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          DLL Side-Loading
          11
          Disable or Modify Tools
          LSASS Memory21
          Security Software Discovery
          Remote Desktop ProtocolData from Removable Media3
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
          Process Injection
          Security Account Manager3
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared Drive3
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          Obfuscated Files or Information
          NTDS12
          System Information Discovery
          Distributed Component Object ModelInput Capture4
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Software Packing
          LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Timestomp
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          DLL Side-Loading
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          EeXJoO1J62.exe71%ReversingLabsByteCode-MSIL.Trojan.DiscordRAT
          EeXJoO1J62.exe100%AviraTR/Agent.lsgui
          EeXJoO1J62.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          gateway.discord.gg
          162.159.136.234
          truefalse
            high
            NameMaliciousAntivirus DetectionReputation
            https://gateway.discord.gg/?v=9&encording=jsonfalse
              high
              NameSourceMaliciousAntivirus DetectionReputation
              https://geolocation-db.com/jsonEeXJoO1J62.exefalse
                high
                https://file.io/EeXJoO1J62.exefalse
                  high
                  https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/PasswordSteEeXJoO1J62.exefalse
                    high
                    https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/rootkit.dllEeXJoO1J62.exefalse
                      high
                      https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/unrootkit.dEeXJoO1J62.exefalse
                        high
                        https://gateway.discord.gg:443/?v=9&encording=jsonEeXJoO1J62.exe, 00000005.00000002.1578328505.0000029CAFF21000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://upx.sf.netAmcache.hve.10.drfalse
                            high
                            http://gateway.discord.ggEeXJoO1J62.exe, 00000005.00000002.1578328505.0000029CAFFD5000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://gateway.discord.ggEeXJoO1J62.exe, 00000005.00000002.1578328505.0000029CAFFB9000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/Webcam.dllEeXJoO1J62.exefalse
                                  high
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameEeXJoO1J62.exe, 00000005.00000002.1578328505.0000029CAFF21000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://discord.com/api/v9/channels/EeXJoO1J62.exefalse
                                      high
                                      https://gateway.discord.gg/?v=9&encording=jsonXEeXJoO1J62.exe, 00000005.00000002.1578328505.0000029CAFFB9000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://discord.com/api/v9/guilds/EeXJoO1J62.exefalse
                                          high
                                          https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/Token%20graEeXJoO1J62.exefalse
                                            high
                                            http://www.google.com/maps/place/EeXJoO1J62.exefalse
                                              high
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              162.159.136.234
                                              gateway.discord.ggUnited States
                                              13335CLOUDFLARENETUSfalse
                                              Joe Sandbox version:41.0.0 Charoite
                                              Analysis ID:1569807
                                              Start date and time:2024-12-06 10:16:31 +01:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 4m 18s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:16
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:EeXJoO1J62.exe
                                              renamed because original name is a hash value
                                              Original Sample Name:6c7dfceb22fe0ef78835f29e53ae6b3e.exe
                                              Detection:MAL
                                              Classification:mal80.troj.evad.winEXE@2/5@1/1
                                              EGA Information:Failed
                                              HCA Information:
                                              • Successful, ratio: 100%
                                              • Number of executed functions: 14
                                              • Number of non-executed functions: 4
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                              • Excluded IPs from analysis (whitelisted): 13.89.179.12
                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, onedsblobprdcus17.centralus.cloudapp.azure.com, fe3cr.delivery.mp.microsoft.com
                                              • Execution Graph export aborted for target EeXJoO1J62.exe, PID 5348 because it is empty
                                              • Not all processes where analyzed, report is missing behavior information
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                                              • Report size getting too big, too many NtSetInformationFile calls found.
                                              • VT rate limit hit for: EeXJoO1J62.exe
                                              TimeTypeDescription
                                              04:17:57API Interceptor1x Sleep call for process: WerFault.exe modified
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              162.159.136.234LDlanZur0i.exeGet hashmaliciousUnknownBrowse
                                                http://relay.csgoze520.com/Get hashmaliciousUnknownBrowse
                                                  https://hkdiscord.antsoon.com/Get hashmaliciousUnknownBrowse
                                                    SecuriteInfo.com.Python.Stealer.1210.4443.27895.exeGet hashmaliciousPython Stealer, Discord Token StealerBrowse
                                                      http://www.cyclic.sh/pricingGet hashmaliciousHTMLPhisherBrowse
                                                        bang_executor.exeGet hashmaliciousDicrord RatBrowse
                                                          noway-2D8EB.exeGet hashmaliciousDicrord RatBrowse
                                                            SecuriteInfo.com.Exploit.Shell.29354.24275.exeGet hashmaliciousUnknownBrowse
                                                              SecuriteInfo.com.Exploit.Shell.29354.24275.exeGet hashmaliciousUnknownBrowse
                                                                1EdVSOmvh0.exeGet hashmaliciousDicrord RatBrowse
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  gateway.discord.gggcrY4QgzW9.exeGet hashmaliciousDiscord RatBrowse
                                                                  • 162.159.135.234
                                                                  XZaysgiUfm.exeGet hashmaliciousDiscord RatBrowse
                                                                  • 162.159.133.234
                                                                  SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exeGet hashmaliciousDiscord RatBrowse
                                                                  • 162.159.130.234
                                                                  BX7yRz7XqF.lnkGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                                  • 162.159.135.234
                                                                  jKSjtQ8W7O.lnkGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                                  • 162.159.135.234
                                                                  U7TJ7Rq13y.lnkGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                                  • 162.159.133.234
                                                                  Sv6eQZzG0Z.lnkGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                                  • 162.159.135.234
                                                                  https://bafybeihwopeeamsw6gk3vbg3wbftvt3n2qngbzo5a4hlnpvlv4hc3vvmyy.ipfs.dweb.link/Get hashmaliciousUnknownBrowse
                                                                  • 162.159.136.234
                                                                  https://mjj.aigc369.com/Get hashmaliciousUnknownBrowse
                                                                  • 162.159.133.234
                                                                  http://relay.csgoze520.com/Get hashmaliciousUnknownBrowse
                                                                  • 162.159.136.234
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  CLOUDFLARENETUSgcrY4QgzW9.exeGet hashmaliciousDiscord RatBrowse
                                                                  • 162.159.135.234
                                                                  XZaysgiUfm.exeGet hashmaliciousDiscord RatBrowse
                                                                  • 162.159.133.234
                                                                  pn866G3CCj.lnkGet hashmaliciousUnknownBrowse
                                                                  • 104.21.21.242
                                                                  QUOTATON-37839993.exeGet hashmaliciousFormBookBrowse
                                                                  • 172.67.178.93
                                                                  vZAhXkWkDT.lnkGet hashmaliciousUnknownBrowse
                                                                  • 104.21.21.242
                                                                  Voicemail_+Transcription001799.docxGet hashmaliciousUnknownBrowse
                                                                  • 104.21.96.1
                                                                  REQUEST FOR HOPPER SCALE AND CONVEYOR MACHINE.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • 104.26.13.205
                                                                  fiyati_teklif 65TIBBI20_ Memorial Medikal Cihaz Sipari#U015fi jpeg docx _ .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • 172.67.177.134
                                                                  http://www.javatpoint.com.cach3.com/Get hashmaliciousUnknownBrowse
                                                                  • 104.21.43.239
                                                                  hesaphareketi-01.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                  • 104.21.67.152
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  3b5074b1b5d032e5620f69f9f700ff0egcrY4QgzW9.exeGet hashmaliciousDiscord RatBrowse
                                                                  • 162.159.136.234
                                                                  XZaysgiUfm.exeGet hashmaliciousDiscord RatBrowse
                                                                  • 162.159.136.234
                                                                  REQUEST FOR HOPPER SCALE AND CONVEYOR MACHINE.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • 162.159.136.234
                                                                  fiyati_teklif 65TIBBI20_ Memorial Medikal Cihaz Sipari#U015fi jpeg docx _ .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • 162.159.136.234
                                                                  Fiyat Teklifi_2038900001-MOKAPTO-06122024.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • 162.159.136.234
                                                                  NewOrder12052024.jsGet hashmaliciousRemcosBrowse
                                                                  • 162.159.136.234
                                                                  16547.jsGet hashmaliciousMassLogger RATBrowse
                                                                  • 162.159.136.234
                                                                  PO54782322024.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • 162.159.136.234
                                                                  965600.invoice.exeGet hashmaliciousFormBookBrowse
                                                                  • 162.159.136.234
                                                                  BQ_PO#385995.exeGet hashmaliciousRedLine, Snake Keylogger, VIP Keylogger, XWormBrowse
                                                                  • 162.159.136.234
                                                                  No context
                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):65536
                                                                  Entropy (8bit):1.165789510559808
                                                                  Encrypted:false
                                                                  SSDEEP:192:ZurR3P08rLVkaWQdl/N6fmzuiFWZ24lO8M:crRs8rLVkar/gfmzuiFWY4lO8M
                                                                  MD5:81CB8E2047F094EB7E2F84050C759812
                                                                  SHA1:D02AC7C2B652712F05A3195E2692284F070ECD7B
                                                                  SHA-256:6C2BA02942BFF18C80093E6A69DFD81C31ED18731BC36490CB258393A6D34D7B
                                                                  SHA-512:3252A0A3531E757EDFD5654D126A05825A7ECD3FFBB9C7B1A6D8E12F8440318DB2EE38EC5A40CDD3A9DB130AE0A950D9FEA5EC76810251861CD5824FBF5FDD24
                                                                  Malicious:true
                                                                  Reputation:low
                                                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.7.9.5.0.2.5.1.4.4.7.2.1.9.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.7.9.5.0.2.5.2.2.2.8.4.6.3.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.0.2.6.6.a.4.4.-.8.8.f.5.-.4.8.9.b.-.9.0.1.2.-.6.1.1.6.f.c.9.f.0.8.b.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.7.3.5.7.f.8.e.-.5.2.3.8.-.4.3.5.a.-.b.3.7.f.-.3.c.7.4.a.f.d.4.6.9.9.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.E.e.X.J.o.O.1.J.6.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.D.i.s.c.o.r.d. .r.a.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.e.4.-.0.0.0.1.-.0.0.1.3.-.8.d.b.e.-.9.7.a.b.b.f.4.7.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.4.3.f.e.e.e.1.7.a.3.6.3.4.1.9.f.5.5.d.6.5.e.a.2.c.1.6.f.5.b.3.0.0.0.0.0.0.0.0.0.!.0.0.0.0.c.8.b.2.9.0.b.0.e.c.6.7.a.3.c.a.d.f.a.6.7.6.6.c.f.1.e.6.3.0.4.1.4.c.1.c.6.1.c.1.!.E.e.X.J.o.O.1.J.
                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                  File Type:Mini DuMP crash report, 16 streams, Fri Dec 6 09:17:31 2024, 0x1205a4 type
                                                                  Category:dropped
                                                                  Size (bytes):549241
                                                                  Entropy (8bit):2.919222473496267
                                                                  Encrypted:false
                                                                  SSDEEP:3072:xOVgdchwPICEKoVmfyBOXpIymdSZly6s+oRrwg4yUP7lwxcSER8Fu1CCqKE6zu3a:Tc2zEwYLhDhe8aqyu3QjY
                                                                  MD5:3A39EAFCB078574B200C7D37D955E915
                                                                  SHA1:65AE2802A81AA1953909012EAE770B2215E6D513
                                                                  SHA-256:EE1B7512AB9E509CEDD97D4B3EAE3847B4A1CC10141CC596D57E93D6C4127149
                                                                  SHA-512:A5CD2221FB1F94FBA0D2F3832C57C087577BAA0F5A4B9C410B304187D4309D9202667CCC96AEEBEE05F0CF59FC0A572D13B2BE71F6E5F7F1FA58B6EBB2A1545F
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:MDMP..a..... .......+.Rg....................................<....)..........H).......?..............l.......8...........T...........([..Q...........T4..........@6..............................................................................eJ.......6......Lw......................T...........(.Rg.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):8802
                                                                  Entropy (8bit):3.7043311082371164
                                                                  Encrypted:false
                                                                  SSDEEP:192:R6l7wVeJO9xy6Ye3LkZwgmfZMEDKprO89btJ0fzvm:R6lXJsE6Y+LQwgmf5DYt6fS
                                                                  MD5:83D4BA93B77D2B2AB0D20916A1E61B50
                                                                  SHA1:0AE33DE18F5BCBCB9B0C285D26DBCEAC21BE3496
                                                                  SHA-256:053FE77F02B720463803840E37C7EC9A5C6A874DBDA96694F0DD2557330B3AC5
                                                                  SHA-512:A5C0B2462463356196358AD62BE86AF6A03904FE327074B11A67C100C98B4A93B664C01A73FCC84B507086AC74FF6D2B2946F61B37F0B7305056EC6463B124F2
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.3.4.8.<./.P.i.
                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):4806
                                                                  Entropy (8bit):4.482777063228815
                                                                  Encrypted:false
                                                                  SSDEEP:48:cvIwWl8zsZQJg771I9a9WpW8VYOYm8M4Jj4b6Ftyq8vW4b1SGbcend:uIjfwI7pM7VGJUaWNJXbcend
                                                                  MD5:83A1DD26C25BF7BC6187325ACEA1839A
                                                                  SHA1:C6688338EDE15AED4B13F0A3E8B545B66F62CF89
                                                                  SHA-256:BBB21DD67E8500863A24E227DF78DC01F3E4D0F6982AA3C6D4F481ED1897A148
                                                                  SHA-512:60992884F0633A4C094E35C5E07FD181698DF840B73350234F4CBCAAE5DDDDFAEB918EB9C0FE601F4D813B3B80550774188662F3F6A5DD67669680B1BEE501DA
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="619220" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                  File Type:MS Windows registry file, NT/2000 or above
                                                                  Category:dropped
                                                                  Size (bytes):1835008
                                                                  Entropy (8bit):4.298930715861244
                                                                  Encrypted:false
                                                                  SSDEEP:6144:aECqOEmWfd+WQFHy/9026ZTyaRsCDusBqD5dooi8lVSD6VJSRnU:HCsL6seqD5ScSWVARU
                                                                  MD5:2C781F8CC6D1B03C09C921042FFD7CA9
                                                                  SHA1:0EFF98983ECE921391768D509B74396F4E842134
                                                                  SHA-256:290BC0E24FECE429D5B98835236C6622C4CC7BB928EAA8FE5B2D5942C7209252
                                                                  SHA-512:948A4244D23F730FF50E2405D98CB53AE9869445253FD4A9ED642F35FF72C00B082A459D9DA8453390F7466BEA23A4FC4C5F76589E8B443F5A5E51F9F4E4D1B1
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:regfD...D....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.....G...............................................................................................................................................................................................................................................................................................................................................D..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                                                  Entropy (8bit):5.4821100116111365
                                                                  TrID:
                                                                  • Win64 Executable GUI Net Framework (217006/5) 49.88%
                                                                  • Win64 Executable GUI (202006/5) 46.43%
                                                                  • Win64 Executable (generic) (12005/4) 2.76%
                                                                  • Generic Win/DOS Executable (2004/3) 0.46%
                                                                  • DOS Executable Generic (2002/1) 0.46%
                                                                  File name:EeXJoO1J62.exe
                                                                  File size:80'384 bytes
                                                                  MD5:6c7dfceb22fe0ef78835f29e53ae6b3e
                                                                  SHA1:c8b290b0ec67a3cadfa6766cf1e630414c1c61c1
                                                                  SHA256:a766923ebb53cbff64f0603af9f07a4a5076aeff4d3416b7c817905a1a1c0a3f
                                                                  SHA512:a506c076fe1b06c873aee2ebad22e953c3e0cf766736fa05f66f60031f7f7184c4d81e033f7787dfd1e007ec1feed88717a900fb76acb9fd42b8294807ef2964
                                                                  SSDEEP:1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+8PIC:5Zv5PDwbjNrmAE+wIC
                                                                  TLSH:5D73C8C877AD8903FBBF5EBD147141524B72BB17E935F68D088C54E611A2B828C42B9B
                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d................."...0..2............... .....@..... ....................................`...@......@............... .....
                                                                  Icon Hash:90cececece8e8eb0
                                                                  Entrypoint:0x140000000
                                                                  Entrypoint Section:
                                                                  Digitally signed:false
                                                                  Imagebase:0x140000000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                  Time Stamp:0xD6D709DC [Mon Mar 20 18:56:28 2084 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:4
                                                                  OS Version Minor:0
                                                                  File Version Major:4
                                                                  File Version Minor:0
                                                                  Subsystem Version Major:4
                                                                  Subsystem Version Minor:0
                                                                  Import Hash:
                                                                  Instruction
                                                                  dec ebp
                                                                  pop edx
                                                                  nop
                                                                  add byte ptr [ebx], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax+eax], al
                                                                  add byte ptr [eax], al
                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x160000x5b6.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  .text0x20000x130380x132008492399cb4eb5d3fed60df5fef8d599aFalse0.35836652369281047data5.508154797696816IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                  .rsrc0x160000x5b60x600bea68bc442fa63fbe2807c2fdac84be0False0.416015625data4.08919936126734IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                  RT_VERSION0x160a00x32cdata0.41995073891625617
                                                                  RT_MANIFEST0x163cc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Dec 6, 2024 10:17:29.656405926 CET49708443192.168.2.11162.159.136.234
                                                                  Dec 6, 2024 10:17:29.656431913 CET44349708162.159.136.234192.168.2.11
                                                                  Dec 6, 2024 10:17:29.656661987 CET49708443192.168.2.11162.159.136.234
                                                                  Dec 6, 2024 10:17:29.813031912 CET49708443192.168.2.11162.159.136.234
                                                                  Dec 6, 2024 10:17:29.813071966 CET44349708162.159.136.234192.168.2.11
                                                                  Dec 6, 2024 10:17:31.031359911 CET44349708162.159.136.234192.168.2.11
                                                                  Dec 6, 2024 10:17:31.031441927 CET49708443192.168.2.11162.159.136.234
                                                                  Dec 6, 2024 10:17:31.039333105 CET49708443192.168.2.11162.159.136.234
                                                                  Dec 6, 2024 10:17:31.039345980 CET44349708162.159.136.234192.168.2.11
                                                                  Dec 6, 2024 10:17:31.039639950 CET44349708162.159.136.234192.168.2.11
                                                                  Dec 6, 2024 10:17:31.088032007 CET49708443192.168.2.11162.159.136.234
                                                                  Dec 6, 2024 10:17:31.123728037 CET49708443192.168.2.11162.159.136.234
                                                                  Dec 6, 2024 10:17:31.167346001 CET44349708162.159.136.234192.168.2.11
                                                                  Dec 6, 2024 10:17:31.492436886 CET44349708162.159.136.234192.168.2.11
                                                                  Dec 6, 2024 10:17:31.492502928 CET44349708162.159.136.234192.168.2.11
                                                                  Dec 6, 2024 10:17:31.492599010 CET49708443192.168.2.11162.159.136.234
                                                                  Dec 6, 2024 10:17:31.503776073 CET49708443192.168.2.11162.159.136.234
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Dec 6, 2024 10:17:29.502841949 CET6544953192.168.2.111.1.1.1
                                                                  Dec 6, 2024 10:17:29.640746117 CET53654491.1.1.1192.168.2.11
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                  Dec 6, 2024 10:17:29.502841949 CET192.168.2.111.1.1.10x905aStandard query (0)gateway.discord.ggA (IP address)IN (0x0001)false
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  Dec 6, 2024 10:17:29.640746117 CET1.1.1.1192.168.2.110x905aNo error (0)gateway.discord.gg162.159.136.234A (IP address)IN (0x0001)false
                                                                  Dec 6, 2024 10:17:29.640746117 CET1.1.1.1192.168.2.110x905aNo error (0)gateway.discord.gg162.159.133.234A (IP address)IN (0x0001)false
                                                                  Dec 6, 2024 10:17:29.640746117 CET1.1.1.1192.168.2.110x905aNo error (0)gateway.discord.gg162.159.135.234A (IP address)IN (0x0001)false
                                                                  Dec 6, 2024 10:17:29.640746117 CET1.1.1.1192.168.2.110x905aNo error (0)gateway.discord.gg162.159.134.234A (IP address)IN (0x0001)false
                                                                  Dec 6, 2024 10:17:29.640746117 CET1.1.1.1192.168.2.110x905aNo error (0)gateway.discord.gg162.159.130.234A (IP address)IN (0x0001)false
                                                                  • gateway.discord.gg
                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.2.1149708162.159.136.2344435348C:\Users\user\Desktop\EeXJoO1J62.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-12-06 09:17:31 UTC187OUTGET /?v=9&encording=json HTTP/1.1
                                                                  Connection: Upgrade,Keep-Alive
                                                                  Upgrade: websocket
                                                                  Sec-WebSocket-Key: LIAfAmPHO7MZvdbGNUjUIA==
                                                                  Sec-WebSocket-Version: 13
                                                                  Host: gateway.discord.gg
                                                                  2024-12-06 09:17:31 UTC616INHTTP/1.1 404 Not Found
                                                                  Date: Fri, 06 Dec 2024 09:17:31 GMT
                                                                  Content-Length: 0
                                                                  Connection: close
                                                                  CF-Cache-Status: DYNAMIC
                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HBv8kCeayGbSWq83pLURg8O3N%2BCCAP7700C1t4UkzRDbQhn1%2F6Nxoztt%2FqCGLZccD7heg3sKnKx7UJa71SJDRBpPhEHHurzXjU%2BJ0Sg3UlAt1mHoDzLc3ke4g5gytfzaZZbG0Q%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                  Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                  X-Content-Type-Options: nosniff
                                                                  Server: cloudflare
                                                                  CF-RAY: 8edb2eee9e13330c-EWR


                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:5
                                                                  Start time:04:17:28
                                                                  Start date:06/12/2024
                                                                  Path:C:\Users\user\Desktop\EeXJoO1J62.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Users\user\Desktop\EeXJoO1J62.exe"
                                                                  Imagebase:0x29cae270000
                                                                  File size:80'384 bytes
                                                                  MD5 hash:6C7DFCEB22FE0EF78835F29E53AE6B3E
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_DiscordRat, Description: Yara detected Discord Rat, Source: 00000005.00000000.1277758910.0000029CAE272000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:10
                                                                  Start time:04:17:31
                                                                  Start date:06/12/2024
                                                                  Path:C:\Windows\System32\WerFault.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\WerFault.exe -u -p 5348 -s 2332
                                                                  Imagebase:0x7ff6501f0000
                                                                  File size:570'736 bytes
                                                                  MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Reset < >
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1579264921.00007FFE7E130000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7E130000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7ffe7e130000_EeXJoO1J62.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: {=O_^
                                                                    • API String ID: 0-164548977
                                                                    • Opcode ID: 5a9a2b53df9e030c458dbf2f6707b7841114befcd80802d5376e40f48b853979
                                                                    • Instruction ID: 5faa689e8075a1e836632cbd1d29129a9b59f74a743cfa58ea12b6ac185d8dbe
                                                                    • Opcode Fuzzy Hash: 5a9a2b53df9e030c458dbf2f6707b7841114befcd80802d5376e40f48b853979
                                                                    • Instruction Fuzzy Hash: 38E04F31458B094BC344DF18D44149EB7E0FF94360F800B2FF09AC22B1DB7595818B82
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1579264921.00007FFE7E130000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7E130000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7ffe7e130000_EeXJoO1J62.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 86896fd5f81e16ded08e610306d13bdf8f3b648bf9605ed72037944f19cd2557
                                                                    • Instruction ID: f2e5eda57edece167de57c839ddb778ab4e5fa42f20e0917dbc8b25776924dff
                                                                    • Opcode Fuzzy Hash: 86896fd5f81e16ded08e610306d13bdf8f3b648bf9605ed72037944f19cd2557
                                                                    • Instruction Fuzzy Hash: 6F212732A2CA690FE71DAB2C5C0A1BD77D5EBD6321F04007FE08AC36A2DD6568078385
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1579264921.00007FFE7E130000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7E130000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7ffe7e130000_EeXJoO1J62.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c7c40610898ba68f1a3346a54da9c64efcee095b61f003e77a46d4289d4cb11f
                                                                    • Instruction ID: bada89506172abc76d4de70209c880cfd74586def0da6dcb9cd38559b8faa064
                                                                    • Opcode Fuzzy Hash: c7c40610898ba68f1a3346a54da9c64efcee095b61f003e77a46d4289d4cb11f
                                                                    • Instruction Fuzzy Hash: 7C51BF2291D6C90FE766937858261E97FE1DF87325F0901FBD4ECCB4A3D91D681A8382
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1579264921.00007FFE7E130000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7E130000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7ffe7e130000_EeXJoO1J62.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c87c40b195ced7ce27d155d7777fff341676725fd55b8f81a0c48be0456b85fd
                                                                    • Instruction ID: 20907417c0e5f087958aed84d17cd7fcc0decf79b3565ac8c828a7599cc96da3
                                                                    • Opcode Fuzzy Hash: c87c40b195ced7ce27d155d7777fff341676725fd55b8f81a0c48be0456b85fd
                                                                    • Instruction Fuzzy Hash: 0B417F71918B1C8FDB58EF98D8466EDBBF1FB98310F00826BD449D3252DA34A845CBC1
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1579264921.00007FFE7E130000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7E130000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7ffe7e130000_EeXJoO1J62.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 499b1716746c9b613d1ac5bf54dd841014561c9df5111643d2fc2eb9a690fce6
                                                                    • Instruction ID: 59c55e92fe75a46c83a0c9f40a1860399ae2b3f9af452009bf23faee29d380a4
                                                                    • Opcode Fuzzy Hash: 499b1716746c9b613d1ac5bf54dd841014561c9df5111643d2fc2eb9a690fce6
                                                                    • Instruction Fuzzy Hash: 6F213531A18A0A8FDB95EF18D4816EEB3E1FF58310F545676D05AD3655CA34F842CBC0
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1579264921.00007FFE7E130000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7E130000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7ffe7e130000_EeXJoO1J62.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 217542b690fd162753cf9583f8ca98ca23d22343502cd24f186190f5a536aada
                                                                    • Instruction ID: 8b22e744139c13c37174a8d14f6bf7c06b8d232f02501ad9e253b64ab4eb4ec0
                                                                    • Opcode Fuzzy Hash: 217542b690fd162753cf9583f8ca98ca23d22343502cd24f186190f5a536aada
                                                                    • Instruction Fuzzy Hash: 00219023D2995E4AFBB4A62848132F977D1EF8932AF44017BD4BDC25E3ED1C791A0681
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1579264921.00007FFE7E130000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7E130000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7ffe7e130000_EeXJoO1J62.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 123fb4d7b9c4fc9e5a1603df1ea349b83d2a4dc1e522526f4dd1adb7a8d1c3a7
                                                                    • Instruction ID: 6050b86743bb74edb46c22800eb92801fe0dcd3c1c769c84d6f271ac2aa0dd56
                                                                    • Opcode Fuzzy Hash: 123fb4d7b9c4fc9e5a1603df1ea349b83d2a4dc1e522526f4dd1adb7a8d1c3a7
                                                                    • Instruction Fuzzy Hash: 38F06D32E1CA194EDA18BB58B4029FCB790EF99320B5400BBE04AA3593ED2978424AC5
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1579264921.00007FFE7E130000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7E130000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7ffe7e130000_EeXJoO1J62.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: dad5060890bd6e9e6a01ada4df93ea1d73fc2beeba5606981781e0f3676fabfd
                                                                    • Instruction ID: 901cb32123b67777203558b8e5615a37215eb3e3fb3836a67d1d15434d3c8725
                                                                    • Opcode Fuzzy Hash: dad5060890bd6e9e6a01ada4df93ea1d73fc2beeba5606981781e0f3676fabfd
                                                                    • Instruction Fuzzy Hash: 69F03030724D4E4FDA99E71C80B4AB9B7E3FFA8341708456ED04AC3AA2DF64EC028701
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1579264921.00007FFE7E130000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7E130000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7ffe7e130000_EeXJoO1J62.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: a5bf9a9846893c1bf43db446d2d16ec6209aad88ba5dd1b8349c3127e2ced78f
                                                                    • Instruction ID: 3604b1a25cb6f8ae0fdfac298469d2d7da2051627a88f4c5bc680559e1020aed
                                                                    • Opcode Fuzzy Hash: a5bf9a9846893c1bf43db446d2d16ec6209aad88ba5dd1b8349c3127e2ced78f
                                                                    • Instruction Fuzzy Hash: E8F03A3160860E8FCF85EF48D8429EFB3A1FF58310B104666E459C7158CA30E851CBC0
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1579264921.00007FFE7E130000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7E130000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7ffe7e130000_EeXJoO1J62.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 1dc2a74137cf628058a51e1d14bf06072b73b1582c7c1eed467d7ae9ffadf862
                                                                    • Instruction ID: 0f6f858b236a67be7183942f3de4e38a244f79561d9cdd57bdd29e20f107b5eb
                                                                    • Opcode Fuzzy Hash: 1dc2a74137cf628058a51e1d14bf06072b73b1582c7c1eed467d7ae9ffadf862
                                                                    • Instruction Fuzzy Hash: 48E0222292E7850FE31AA3AC08523727FE1CB4A200F0442FFC099C36A3C88D48854352
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1579264921.00007FFE7E130000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7E130000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7ffe7e130000_EeXJoO1J62.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c50af57d7be68490e4932a3235700947f0e94099d590f9339def58ebeb39c434
                                                                    • Instruction ID: b35d74355876bf0f8a0d8c27d6a7f163781f82e91fdc551d0c80b91dffedf583
                                                                    • Opcode Fuzzy Hash: c50af57d7be68490e4932a3235700947f0e94099d590f9339def58ebeb39c434
                                                                    • Instruction Fuzzy Hash: 2AE0C222F5881E49EA50B37838575FDF285DFC8304BC44873E06DC2493DC1C290101C1
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1579264921.00007FFE7E130000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7E130000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7ffe7e130000_EeXJoO1J62.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 67577ac7c3ffce161036e8750b430956925583ca7b9c1c6af797ae5e950b9c74
                                                                    • Instruction ID: ff606da6516d8a3ee18847f8d8828c4937018d1a4e29db65023e10626307e393
                                                                    • Opcode Fuzzy Hash: 67577ac7c3ffce161036e8750b430956925583ca7b9c1c6af797ae5e950b9c74
                                                                    • Instruction Fuzzy Hash: DEE0DF12A1D4820BF199A36E941336C3BD0AF81304FD804FBD0DDC62A7DC8DA8828301
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1579264921.00007FFE7E130000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7E130000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7ffe7e130000_EeXJoO1J62.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 510c850c0f9f987141659c99f7a7ae6720298a472f922577c696ccf3a350b1cb
                                                                    • Instruction ID: a60950621c2d408e85f6cf0519d0949197fbd720bc09e9e85b58246a731e9ca8
                                                                    • Opcode Fuzzy Hash: 510c850c0f9f987141659c99f7a7ae6720298a472f922577c696ccf3a350b1cb
                                                                    • Instruction Fuzzy Hash: D8E0CD65A1848A5FE351977C54572BD7FE0FF9431070405FFD0D9C71A2DD1824418700
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1579264921.00007FFE7E130000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7E130000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7ffe7e130000_EeXJoO1J62.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: f12cd827578ceeaed5c7b3bad2ecee9546a40a89db684b8e5412515db8949525
                                                                    • Instruction ID: a5445767126641c80b2573ae773d1e5e3ed1221be862eb35bcbd188d84aa0b8c
                                                                    • Opcode Fuzzy Hash: f12cd827578ceeaed5c7b3bad2ecee9546a40a89db684b8e5412515db8949525
                                                                    • Instruction Fuzzy Hash: 2EC0123246C64957D745A714E4418EE73A0BFD0310F841B3BF04A810A5DD5866458681
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1579264921.00007FFE7E130000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7E130000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7ffe7e130000_EeXJoO1J62.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: f7ae1e0ecc561048f4151c5cbcfa783591fcd467f7a5fa6e8a9e1e7e931e6422
                                                                    • Instruction ID: 46afa17cab920c961ac3ea9528e641bdc1df917a132a206eb02c6157d675bad7
                                                                    • Opcode Fuzzy Hash: f7ae1e0ecc561048f4151c5cbcfa783591fcd467f7a5fa6e8a9e1e7e931e6422
                                                                    • Instruction Fuzzy Hash: 40A1601BF1C56245E62172BEB5021EDBF44DFD2375B0C46B7D2EC898E36908388E86E5
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1579264921.00007FFE7E130000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7E130000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7ffe7e130000_EeXJoO1J62.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 4942b3c476a1b6034da4430031ec9554ed137a3d9850b01446c5af50b0f9d9e6
                                                                    • Instruction ID: 89e4efc92716285b4c46780dcb658619c29ba8b69a1a1402d40df2d2b5ab3671
                                                                    • Opcode Fuzzy Hash: 4942b3c476a1b6034da4430031ec9554ed137a3d9850b01446c5af50b0f9d9e6
                                                                    • Instruction Fuzzy Hash: 1EA17017E1C56245E62272BEB5021EDBF08DF93375B0C46B7D2EC8D8E36D08348A86E5
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1579264921.00007FFE7E130000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7E130000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7ffe7e130000_EeXJoO1J62.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 2486c49d55e6492d3d680713ed183ea7a83515dbced9143b811f4667b23df44f
                                                                    • Instruction ID: 6fd5c680134c5059beb86d08e4fe5f6859c827a6acb7631062327bdc9dbda7d1
                                                                    • Opcode Fuzzy Hash: 2486c49d55e6492d3d680713ed183ea7a83515dbced9143b811f4667b23df44f
                                                                    • Instruction Fuzzy Hash: CF512047E1856215E22132BDB5061FD6F48DF92375B0C46B7E2EC898E36D0C748A86E9
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1579264921.00007FFE7E130000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7E130000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7ffe7e130000_EeXJoO1J62.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c7a16b1afc31351f195c186fb79bde10fee4572014dda7308c414b1d85f8317f
                                                                    • Instruction ID: 921b1b6a5eb9955cc46caef663fa036982cade7f93adae838d1a05fcae5db58c
                                                                    • Opcode Fuzzy Hash: c7a16b1afc31351f195c186fb79bde10fee4572014dda7308c414b1d85f8317f
                                                                    • Instruction Fuzzy Hash: F4513147E1852215E22132BDB5061FD6F48DFA3375B0C86B7E1EC8D8E35D0C348A86E9