Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rEzX7eqgfo.exe

Overview

General Information

Sample name:rEzX7eqgfo.exe
renamed because original name is a hash value
Original sample name:8c6a99f240d978718d2f962619c23168.exe
Analysis ID:1589015
MD5:8c6a99f240d978718d2f962619c23168
SHA1:cbee26a0553840d6f3cdb5fc306c3bc13cdbf7d4
SHA256:240175a3a74b70fb9f6d0463042d6ef21223e2acc843e589d91ec607d52305a8
Tags:AsyncRATexeuser-abuse_ch
Infos:

Detection

KeyLogger, StormKitty, VenomRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected BrowserPasswordDump
Yara detected Keylogger Generic
Yara detected Powershell download and execute
Yara detected StormKitty Stealer
Yara detected VenomRAT
AI detected suspicious sample
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • rEzX7eqgfo.exe (PID: 4900 cmdline: "C:\Users\user\Desktop\rEzX7eqgfo.exe" MD5: 8C6A99F240D978718D2F962619C23168)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, 404KeyLogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
NameDescriptionAttributionBlogpost URLsLink
Cameleon, StormKittyPWC describes this malware as a backdoor, capable of file management, upload and download of files, and execution of commands.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cameleon
{"Host": ["62.60.226.26"], "Port": ["4449"], "Version": "RAT + hVNC  6.0.5", "Install": "false", "Mutex": "ahyttjzatffxeud", "Certificate": "MIICLjCCAZegAwIBAgIVAPBPXxep5LHy//3KuSIltMYfCHGFMA0GCSqGSIb3DQEBDQUAMGIxFTATBgNVBAMMDFZlbm9tIFNlcnZlcjESMBAGA1UECwwJYWxleGVpa3VuMRswGQYDVQQKDBJWZW5vbSBCeSBhbGV4ZWlrdW4xCzAJBgNVBAcMAlNIMQswCQYDVQQGEwJDTjAeFw0yNDAzMDExNTE1MTZaFw0zNDEyMDkxNTE1MTZaMBAxDjAMBgNVBAMMBVZlbm9tMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCCeUwNOg+0AZcPc0s4gmcK4Eni/3+DY0l45lVNKN0ddW0llXjiJbL0hqKpFdIVBh+3h2QTWbyOLwRM8Ct/nGBZTAG9YYA0RsfHEagU/ldxyA3z74NXaKrRDTncdq/nqig5/djsiWgmAkMTlyQ2XeHXMCHDu72Z79yJPCeGsfqxMQIDAQABozIwMDAdBgNVHQ4EFgQUOiSpmpnHxWJvh331ptHI08FPmpkwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQ0FAAOBgQBvwnIi5E7QmPobMpZMeXDyO+1W1jFAUEJDqBuW7izCZ69Yr/LcVTSfPfJJSJXa1zKf8+TMBPo/Sd2ajCceWmQuUz97G5Bq1oYrED8c9U0Wk6pLMIMAE01Fbl4R790/gBE14xYlzjT3BpJS8m6Nr47WmbtloVxtShR3L0i9niB1IQ==", "Server Signature": "fjw0lvS8s/tcJnmMFJ7edVbjUG8evoOVVUkVscDiiUVIhK2UDABNdbg8yar5sbo480hx86wqAKVABj/XspN5PKuyWVLKhdo6+8bgL09CrVVPS8mtUxvUVirga0uc6Rct8WZQzoTyo9Hir4tdEWyFpj40Vgm4TR92sJDwK7SbWM0="}
SourceRuleDescriptionAuthorStrings
rEzX7eqgfo.exeJoeSecurity_VenomRATYara detected VenomRATJoe Security
    rEzX7eqgfo.exeJoeSecurity_StormKittyYara detected StormKitty StealerJoe Security
      rEzX7eqgfo.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        rEzX7eqgfo.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          rEzX7eqgfo.exeJoeSecurity_BrowserPasswordDump_1Yara detected BrowserPasswordDumpJoe Security
            Click to see the 12 entries
            SourceRuleDescriptionAuthorStrings
            00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_VenomRATYara detected VenomRATJoe Security
              00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_StormKittyYara detected StormKitty StealerJoe Security
                00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_BrowserPasswordDump_1Yara detected BrowserPasswordDumpJoe Security
                    00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_Keylogger_Generic_3Yara detected Keylogger GenericJoe Security
                      Click to see the 11 entries
                      SourceRuleDescriptionAuthorStrings
                      0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpackJoeSecurity_VenomRATYara detected VenomRATJoe Security
                        0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                          0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                            0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpackJoeSecurity_BrowserPasswordDump_1Yara detected BrowserPasswordDumpJoe Security
                              0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpackJoeSecurity_Keylogger_Generic_3Yara detected Keylogger GenericJoe Security
                                Click to see the 27 entries
                                No Sigma rule has matched
                                No Suricata rule has matched

                                Click to jump to signature section

                                Show All Signature Results

                                AV Detection

                                barindex
                                Source: rEzX7eqgfo.exeAvira: detected
                                Source: rEzX7eqgfo.exeMalware Configuration Extractor: VenomRAT {"Host": ["62.60.226.26"], "Port": ["4449"], "Version": "RAT + hVNC 6.0.5", "Install": "false", "Mutex": "ahyttjzatffxeud", "Certificate": "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", "Server Signature": "fjw0lvS8s/tcJnmMFJ7edVbjUG8evoOVVUkVscDiiUVIhK2UDABNdbg8yar5sbo480hx86wqAKVABj/XspN5PKuyWVLKhdo6+8bgL09CrVVPS8mtUxvUVirga0uc6Rct8WZQzoTyo9Hir4tdEWyFpj40Vgm4TR92sJDwK7SbWM0="}
                                Source: rEzX7eqgfo.exeReversingLabs: Detection: 87%
                                Source: rEzX7eqgfo.exeVirustotal: Detection: 62%Perma Link
                                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                                Source: rEzX7eqgfo.exeJoe Sandbox ML: detected
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpackString decryptor: 4449
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpackString decryptor: 62.60.226.26
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpackString decryptor: RAT + hVNC 6.0.5
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpackString decryptor: false
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpackString decryptor: ahyttjzatffxeud
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpackString decryptor: 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
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpackString decryptor: fjw0lvS8s/tcJnmMFJ7edVbjUG8evoOVVUkVscDiiUVIhK2UDABNdbg8yar5sbo480hx86wqAKVABj/XspN5PKuyWVLKhdo6+8bgL09CrVVPS8mtUxvUVirga0uc6Rct8WZQzoTyo9Hir4tdEWyFpj40Vgm4TR92sJDwK7SbWM0=
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpackString decryptor: null
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpackString decryptor: false
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpackString decryptor: false
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpackString decryptor: Default
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpackString decryptor: false
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpackString decryptor: false
                                Source: rEzX7eqgfo.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                Source: Binary string: D:\Backup\Venom RAT + HVNC Finally Released 11.30.2024\HVNCDll\obj\Release\hvnc.pdbP source: rEzX7eqgfo.exe
                                Source: Binary string: D:\Backup\Venom RAT + HVNC Finally Released 11.30.2024\HVNCDll\obj\Release\hvnc.pdb source: rEzX7eqgfo.exe

                                Networking

                                barindex
                                Source: Yara matchFile source: rEzX7eqgfo.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPE
                                Source: global trafficTCP traffic: 192.168.2.7:49700 -> 62.60.226.26:4449
                                Source: Joe Sandbox ViewASN Name: ASLINE-AS-APASLINELIMITEDHK ASLINE-AS-APASLINELIMITEDHK
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: unknownTCP traffic detected without corresponding DNS query: 62.60.226.26
                                Source: rEzX7eqgfo.exeString found in binary or memory: http://ipinfo.io/ip
                                Source: rEzX7eqgfo.exeString found in binary or memory: http://james.newtonking.com/projects/json
                                Source: rEzX7eqgfo.exe, 00000000.00000002.2526621090.0000000002D11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                                Source: rEzX7eqgfo.exeString found in binary or memory: http://www.newtonsoft.com/jsonschema
                                Source: rEzX7eqgfo.exeString found in binary or memory: https://discord.com/api/webhooks/1016614786533969920/fMJOOjA1pZqjV8_s0JC86KN9Fa0FeGPEHaEak8WTADC18s5
                                Source: rEzX7eqgfo.exeString found in binary or memory: https://discordapp.com/api/v6/users/
                                Source: rEzX7eqgfo.exeString found in binary or memory: https://github.com/LimerBoy/StormKitty
                                Source: rEzX7eqgfo.exeString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                                Source: rEzX7eqgfo.exeString found in binary or memory: https://stackoverflow.com/q/14436606/23354cIt
                                Source: rEzX7eqgfo.exeString found in binary or memory: https://stackoverflow.com/q/2152978/23354
                                Source: rEzX7eqgfo.exeString found in binary or memory: https://urn.to/r/sds_see
                                Source: rEzX7eqgfo.exeString found in binary or memory: https://urn.to/r/sds_seeaCould

                                Key, Mouse, Clipboard, Microphone and Screen Capturing

                                barindex
                                Source: Yara matchFile source: rEzX7eqgfo.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: rEzX7eqgfo.exe PID: 4900, type: MEMORYSTR
                                Source: Yara matchFile source: rEzX7eqgfo.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: rEzX7eqgfo.exe PID: 4900, type: MEMORYSTR

                                System Summary

                                barindex
                                Source: rEzX7eqgfo.exe, type: SAMPLEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                                Source: rEzX7eqgfo.exe, type: SAMPLEMatched rule: Detects Stealerium based on specific strings Author: Sekoia.io
                                Source: rEzX7eqgfo.exe, type: SAMPLEMatched rule: Finds StormKitty samples (or their variants) based on specific strings Author: Sekoia.io
                                Source: rEzX7eqgfo.exe, type: SAMPLEMatched rule: Find DcRAT samples (qwqdanchun) based on specific strings Author: Sekoia.io
                                Source: rEzX7eqgfo.exe, type: SAMPLEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                                Source: rEzX7eqgfo.exe, type: SAMPLEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                                Source: rEzX7eqgfo.exe, type: SAMPLEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                                Source: rEzX7eqgfo.exe, type: SAMPLEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
                                Source: rEzX7eqgfo.exe, type: SAMPLEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                                Source: rEzX7eqgfo.exe, type: SAMPLEMatched rule: Detects StormKitty infostealer Author: ditekSHen
                                Source: rEzX7eqgfo.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
                                Source: 0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                                Source: 0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Stealerium based on specific strings Author: Sekoia.io
                                Source: 0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Finds StormKitty samples (or their variants) based on specific strings Author: Sekoia.io
                                Source: 0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Find DcRAT samples (qwqdanchun) based on specific strings Author: Sekoia.io
                                Source: 0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                                Source: 0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                                Source: 0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                                Source: 0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
                                Source: 0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                                Source: 0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPEMatched rule: Detects Stealerium based on specific strings Author: Sekoia.io
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPEMatched rule: Finds StormKitty samples (or their variants) based on specific strings Author: Sekoia.io
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPEMatched rule: Find DcRAT samples (qwqdanchun) based on specific strings Author: Sekoia.io
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPEMatched rule: Detects StormKitty infostealer Author: ditekSHen
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                                Source: 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                                Source: 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                                Source: 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                                Source: Process Memory Space: rEzX7eqgfo.exe PID: 4900, type: MEMORYSTRMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                                Source: Process Memory Space: rEzX7eqgfo.exe PID: 4900, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeCode function: 0_2_00007FFAAC493ACE NtProtectVirtualMemory,0_2_00007FFAAC493ACE
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeCode function: 0_2_00007FFAAC493ACE0_2_00007FFAAC493ACE
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeCode function: 0_2_00007FFAAC492EF00_2_00007FFAAC492EF0
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeCode function: 0_2_00007FFAAC4933DD0_2_00007FFAAC4933DD
                                Source: rEzX7eqgfo.exe, 00000000.00000000.1256592085.0000000000B50000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameClientAny.exe" vs rEzX7eqgfo.exe
                                Source: rEzX7eqgfo.exe, 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamehvnc.exe" vs rEzX7eqgfo.exe
                                Source: rEzX7eqgfo.exe, 00000000.00000002.2525725857.0000000000F0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs rEzX7eqgfo.exe
                                Source: rEzX7eqgfo.exeBinary or memory string: OriginalFilenamehvnc.exe" vs rEzX7eqgfo.exe
                                Source: rEzX7eqgfo.exeBinary or memory string: OriginalFilenameClientAny.exe" vs rEzX7eqgfo.exe
                                Source: rEzX7eqgfo.exe, type: SAMPLEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                                Source: rEzX7eqgfo.exe, type: SAMPLEMatched rule: infostealer_win_stealerium author = Sekoia.io, description = Detects Stealerium based on specific strings, creation_date = 2022-12-01, classification = TLP:CLEAR, version = 1.0, id = 165c7d3d-de7e-4d71-b94a-8ab4a0e5ddd5
                                Source: rEzX7eqgfo.exe, type: SAMPLEMatched rule: infostealer_win_stormkitty author = Sekoia.io, description = Finds StormKitty samples (or their variants) based on specific strings, creation_date = 2023-03-29, classification = TLP:CLEAR, version = 1.0, id = 5014d2e5-af5c-4800-ab1e-b57de37a2450
                                Source: rEzX7eqgfo.exe, type: SAMPLEMatched rule: rat_win_dcrat_qwqdanchun author = Sekoia.io, description = Find DcRAT samples (qwqdanchun) based on specific strings, creation_date = 2023-01-26, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/qwqdanchun/DcRat, id = 8206a410-48b3-425f-9dcb-7a528673a37a
                                Source: rEzX7eqgfo.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                                Source: rEzX7eqgfo.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                                Source: rEzX7eqgfo.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                                Source: rEzX7eqgfo.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
                                Source: rEzX7eqgfo.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                                Source: rEzX7eqgfo.exe, type: SAMPLEMatched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty
                                Source: rEzX7eqgfo.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                                Source: 0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                                Source: 0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: infostealer_win_stealerium author = Sekoia.io, description = Detects Stealerium based on specific strings, creation_date = 2022-12-01, classification = TLP:CLEAR, version = 1.0, id = 165c7d3d-de7e-4d71-b94a-8ab4a0e5ddd5
                                Source: 0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: infostealer_win_stormkitty author = Sekoia.io, description = Finds StormKitty samples (or their variants) based on specific strings, creation_date = 2023-03-29, classification = TLP:CLEAR, version = 1.0, id = 5014d2e5-af5c-4800-ab1e-b57de37a2450
                                Source: 0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: rat_win_dcrat_qwqdanchun author = Sekoia.io, description = Find DcRAT samples (qwqdanchun) based on specific strings, creation_date = 2023-01-26, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/qwqdanchun/DcRat, id = 8206a410-48b3-425f-9dcb-7a528673a37a
                                Source: 0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                                Source: 0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                                Source: 0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                                Source: 0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
                                Source: 0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                                Source: 0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPEMatched rule: infostealer_win_stealerium author = Sekoia.io, description = Detects Stealerium based on specific strings, creation_date = 2022-12-01, classification = TLP:CLEAR, version = 1.0, id = 165c7d3d-de7e-4d71-b94a-8ab4a0e5ddd5
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPEMatched rule: infostealer_win_stormkitty author = Sekoia.io, description = Finds StormKitty samples (or their variants) based on specific strings, creation_date = 2023-03-29, classification = TLP:CLEAR, version = 1.0, id = 5014d2e5-af5c-4800-ab1e-b57de37a2450
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPEMatched rule: rat_win_dcrat_qwqdanchun author = Sekoia.io, description = Find DcRAT samples (qwqdanchun) based on specific strings, creation_date = 2023-01-26, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/qwqdanchun/DcRat, id = 8206a410-48b3-425f-9dcb-7a528673a37a
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty
                                Source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                                Source: 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                                Source: 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                                Source: 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                                Source: Process Memory Space: rEzX7eqgfo.exe PID: 4900, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                                Source: Process Memory Space: rEzX7eqgfo.exe PID: 4900, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/0@0/1
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeFile created: C:\Users\user\AppData\Roaming\7n5rJCiEX08cdKRQsT6vxkbuaZJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeMutant created: \Sessions\1\BaseNamedObjects\aBqoXyRnK9b5jm5faX2ra7vXc+ikaHtqanL//jaSqv0DF2OLwpFG92uUkcY7yTmwqfyk3MsvFUoBMBK9TRk0Vg==
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeMutant created: NULL
                                Source: rEzX7eqgfo.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                Source: rEzX7eqgfo.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.70%
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                Source: rEzX7eqgfo.exeReversingLabs: Detection: 87%
                                Source: rEzX7eqgfo.exeVirustotal: Detection: 62%
                                Source: rEzX7eqgfo.exeString found in binary or memory: /C -StartDelay : Sleeping ISetFileCreationDate : Changing file
                                Source: rEzX7eqgfo.exeString found in binary or memory: maxBufferSize!CheckTaskNotNull/LoadIntoBufferAsyncCore
                                Source: rEzX7eqgfo.exeString found in binary or memory: 9Task Scheduler 2.0 (1.2) does not support setting this property. You must use an InteractiveToken in order to have the task run in the current user session.#RunOnlyIfLoggedOn3RunOnlyIfNetworkAvailable-StopIfGoingOnBatteries
                                Source: rEzX7eqgfo.exeString found in binary or memory: IF294ACFC-3146-4483-A7BF-ADDCA7C260E2
                                Source: rEzX7eqgfo.exeString found in binary or memory: HasSubValue3Conflicting item/add type
                                Source: rEzX7eqgfo.exeString found in binary or memory: U/configuration/appSettings/add[@key='{0}']
                                Source: rEzX7eqgfo.exeString found in binary or memory: $F294ACFC-3146-4483-A7BF-ADDCA7C260E2
                                Source: rEzX7eqgfo.exeString found in binary or memory: $F294ACFC-3146-4483-A7BF-ADDCA7C260E2)
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeSection loaded: mscoree.dllJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeSection loaded: version.dllJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeSection loaded: profapi.dllJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeSection loaded: cryptsp.dllJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeSection loaded: rsaenh.dllJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeSection loaded: cryptbase.dllJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeSection loaded: msasn1.dllJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeSection loaded: mswsock.dllJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeSection loaded: secur32.dllJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeSection loaded: schannel.dllJump to behavior
                                Source: rEzX7eqgfo.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                                Source: rEzX7eqgfo.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                                Source: rEzX7eqgfo.exeStatic file information: File size 3136512 > 1048576
                                Source: rEzX7eqgfo.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x2fca00
                                Source: rEzX7eqgfo.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                Source: Binary string: D:\Backup\Venom RAT + HVNC Finally Released 11.30.2024\HVNCDll\obj\Release\hvnc.pdbP source: rEzX7eqgfo.exe
                                Source: Binary string: D:\Backup\Venom RAT + HVNC Finally Released 11.30.2024\HVNCDll\obj\Release\hvnc.pdb source: rEzX7eqgfo.exe

                                Boot Survival

                                barindex
                                Source: Yara matchFile source: rEzX7eqgfo.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: rEzX7eqgfo.exe PID: 4900, type: MEMORYSTR
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                                Malware Analysis System Evasion

                                barindex
                                Source: Yara matchFile source: rEzX7eqgfo.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: rEzX7eqgfo.exe PID: 4900, type: MEMORYSTR
                                Source: rEzX7eqgfo.exeBinary or memory string: TASKMGR.EXE#PROCESSHACKER.EXE
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeMemory allocated: 1390000 memory reserve | memory write watchJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeMemory allocated: 1AD10000 memory reserve | memory write watchJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exe TID: 7260Thread sleep count: 33 > 30Jump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exe TID: 7260Thread sleep time: -99000s >= -30000sJump to behavior
                                Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                Source: rEzX7eqgfo.exeBinary or memory string: vmware
                                Source: rEzX7eqgfo.exeBinary or memory string: VMwareVBoxAAntiAnalysis : Hosting detected!AAntiAnalysis : Process detected!QAntiAnalysis : Virtual machine detected!AAntiAnalysis : SandBox detected!CAntiAnalysis : Debugger detected!
                                Source: rEzX7eqgfo.exeBinary or memory string: VirtualMachine:
                                Source: rEzX7eqgfo.exe, 00000000.00000002.2528482104.000000001B853000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess information queried: ProcessInformationJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeProcess token adjusted: DebugJump to behavior
                                Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeMemory allocated: page read and write | page guardJump to behavior

                                HIPS / PFW / Operating System Protection Evasion

                                barindex
                                Source: Yara matchFile source: Process Memory Space: rEzX7eqgfo.exe PID: 4900, type: MEMORYSTR
                                Source: rEzX7eqgfo.exeBinary or memory string: Shell_TrayWnd
                                Source: rEzX7eqgfo.exeBinary or memory string: ProgMan
                                Source: rEzX7eqgfo.exeBinary or memory string: Shell_TrayWnd!SHELLDLL_DefView
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeQueries volume information: C:\Users\user\Desktop\rEzX7eqgfo.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\Desktop\rEzX7eqgfo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                                Lowering of HIPS / PFW / Operating System Security Settings

                                barindex
                                Source: Yara matchFile source: rEzX7eqgfo.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: rEzX7eqgfo.exe PID: 4900, type: MEMORYSTR
                                Source: rEzX7eqgfo.exe, 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: MSASCui.exe
                                Source: rEzX7eqgfo.exe, 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: procexp.exe
                                Source: rEzX7eqgfo.exe, 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: MsMpEng.exe

                                Stealing of Sensitive Information

                                barindex
                                Source: Yara matchFile source: rEzX7eqgfo.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: rEzX7eqgfo.exe PID: 4900, type: MEMORYSTR
                                Source: Yara matchFile source: rEzX7eqgfo.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: rEzX7eqgfo.exe PID: 4900, type: MEMORYSTR
                                Source: rEzX7eqgfo.exe, 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Electrum#\Electrum\wallets
                                Source: rEzX7eqgfo.exe, 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: \bytecoinJaxxk\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb
                                Source: rEzX7eqgfo.exe, 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Exodus+\Exodus\exodus.wallet
                                Source: rEzX7eqgfo.exe, 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Ethereum%\Ethereum\keystore
                                Source: rEzX7eqgfo.exe, 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: exodus
                                Source: rEzX7eqgfo.exe, 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Ethereum%\Ethereum\keystore
                                Source: rEzX7eqgfo.exe, 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Coinomi1\Coinomi\Coinomi\wallets
                                Source: rEzX7eqgfo.exe, 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Ethereum%\Ethereum\keystore
                                Source: Yara matchFile source: rEzX7eqgfo.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: rEzX7eqgfo.exe PID: 4900, type: MEMORYSTR

                                Remote Access Functionality

                                barindex
                                Source: Yara matchFile source: rEzX7eqgfo.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.rEzX7eqgfo.exe.975b8a.1.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: rEzX7eqgfo.exe PID: 4900, type: MEMORYSTR
                                Source: Yara matchFile source: rEzX7eqgfo.exe, type: SAMPLE
                                Source: Yara matchFile source: 0.0.rEzX7eqgfo.exe.850000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: rEzX7eqgfo.exe PID: 4900, type: MEMORYSTR
                                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                                Command and Scripting Interpreter
                                1
                                Scheduled Task/Job
                                1
                                Process Injection
                                1
                                Masquerading
                                OS Credential Dumping111
                                Security Software Discovery
                                Remote Services1
                                Archive Collected Data
                                1
                                Encrypted Channel
                                Exfiltration Over Other Network MediumAbuse Accessibility Features
                                CredentialsDomainsDefault Accounts1
                                Scheduled Task/Job
                                1
                                DLL Side-Loading
                                1
                                Scheduled Task/Job
                                2
                                Virtualization/Sandbox Evasion
                                LSASS Memory2
                                Virtualization/Sandbox Evasion
                                Remote Desktop Protocol1
                                Data from Local System
                                1
                                Non-Standard Port
                                Exfiltration Over BluetoothNetwork Denial of Service
                                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                                DLL Side-Loading
                                1
                                Disable or Modify Tools
                                Security Account Manager2
                                Process Discovery
                                SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                                Process Injection
                                NTDS13
                                System Information Discovery
                                Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                                Obfuscated Files or Information
                                LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                                DLL Side-Loading
                                Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                                Hide Legend

                                Legend:

                                • Process
                                • Signature
                                • Created File
                                • DNS/IP Info
                                • Is Dropped
                                • Is Windows Process
                                • Number of created Registry Values
                                • Number of created Files
                                • Visual Basic
                                • Delphi
                                • Java
                                • .Net C# or VB.NET
                                • C, C++ or other language
                                • Is malicious
                                • Internet

                                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                windows-stand
                                SourceDetectionScannerLabelLink
                                rEzX7eqgfo.exe88%ReversingLabsByteCode-MSIL.Trojan.CryoMarte
                                rEzX7eqgfo.exe62%VirustotalBrowse
                                rEzX7eqgfo.exe100%AviraHEUR/AGEN.1357486
                                rEzX7eqgfo.exe100%Joe Sandbox ML
                                No Antivirus matches
                                No Antivirus matches
                                No Antivirus matches
                                No Antivirus matches
                                No contacted domains info
                                NameSourceMaliciousAntivirus DetectionReputation
                                https://stackoverflow.com/q/14436606/23354cItrEzX7eqgfo.exefalse
                                  high
                                  https://urn.to/r/sds_seerEzX7eqgfo.exefalse
                                    high
                                    http://ipinfo.io/iprEzX7eqgfo.exefalse
                                      high
                                      https://github.com/LimerBoy/StormKittyrEzX7eqgfo.exefalse
                                        high
                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namerEzX7eqgfo.exe, 00000000.00000002.2526621090.0000000002D11000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://stackoverflow.com/q/11564914/23354;rEzX7eqgfo.exefalse
                                            high
                                            https://stackoverflow.com/q/2152978/23354rEzX7eqgfo.exefalse
                                              high
                                              https://urn.to/r/sds_seeaCouldrEzX7eqgfo.exefalse
                                                high
                                                http://james.newtonking.com/projects/jsonrEzX7eqgfo.exefalse
                                                  high
                                                  https://discord.com/api/webhooks/1016614786533969920/fMJOOjA1pZqjV8_s0JC86KN9Fa0FeGPEHaEak8WTADC18s5rEzX7eqgfo.exefalse
                                                    high
                                                    http://www.newtonsoft.com/jsonschemarEzX7eqgfo.exefalse
                                                      high
                                                      https://discordapp.com/api/v6/users/rEzX7eqgfo.exefalse
                                                        high
                                                        • No. of IPs < 25%
                                                        • 25% < No. of IPs < 50%
                                                        • 50% < No. of IPs < 75%
                                                        • 75% < No. of IPs
                                                        IPDomainCountryFlagASNASN NameMalicious
                                                        62.60.226.26
                                                        unknownIran (ISLAMIC Republic Of)
                                                        18013ASLINE-AS-APASLINELIMITEDHKtrue
                                                        Joe Sandbox version:42.0.0 Malachite
                                                        Analysis ID:1589015
                                                        Start date and time:2025-01-11 08:26:00 +01:00
                                                        Joe Sandbox product:CloudBasic
                                                        Overall analysis duration:0h 4m 9s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:full
                                                        Cookbook file name:default.jbs
                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                        Number of analysed new started processes analysed:12
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:0
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Analysis stop reason:Timeout
                                                        Sample name:rEzX7eqgfo.exe
                                                        renamed because original name is a hash value
                                                        Original Sample Name:8c6a99f240d978718d2f962619c23168.exe
                                                        Detection:MAL
                                                        Classification:mal100.troj.spyw.evad.winEXE@1/0@0/1
                                                        EGA Information:
                                                        • Successful, ratio: 100%
                                                        HCA Information:
                                                        • Successful, ratio: 100%
                                                        • Number of executed functions: 3
                                                        • Number of non-executed functions: 1
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .exe
                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                        • Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.109.210.53
                                                        • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                                        • Not all processes where analyzed, report is missing behavior information
                                                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                        TimeTypeDescription
                                                        03:59:46API Interceptor24x Sleep call for process: rEzX7eqgfo.exe modified
                                                        No context
                                                        No context
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        ASLINE-AS-APASLINELIMITEDHK6.elfGet hashmaliciousUnknownBrowse
                                                        • 62.60.239.47
                                                        fYT3jJZgOX.exeGet hashmaliciousNjratBrowse
                                                        • 154.197.69.14
                                                        la.bot.arm6.elfGet hashmaliciousMiraiBrowse
                                                        • 180.223.114.199
                                                        pTvHtQDXio.exeGet hashmaliciousAmadeyBrowse
                                                        • 62.60.226.15
                                                        IGz.arm7.elfGet hashmaliciousMiraiBrowse
                                                        • 213.176.118.46
                                                        sh4.xxx.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                        • 185.177.25.107
                                                        i586.xxx.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                        • 185.177.25.107
                                                        x86.xxx.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                        • 185.177.25.107
                                                        x32.xxx.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                        • 185.177.25.107
                                                        arm5.xxx.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                        • 185.177.25.107
                                                        No context
                                                        No context
                                                        No created / dropped files found
                                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Entropy (8bit):5.849737654893876
                                                        TrID:
                                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.70%
                                                        • Win32 Executable (generic) a (10002005/4) 49.65%
                                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                        • Win32 EXE PECompact compressed (generic) (41571/9) 0.21%
                                                        • Windows Screen Saver (13104/52) 0.07%
                                                        File name:rEzX7eqgfo.exe
                                                        File size:3'136'512 bytes
                                                        MD5:8c6a99f240d978718d2f962619c23168
                                                        SHA1:cbee26a0553840d6f3cdb5fc306c3bc13cdbf7d4
                                                        SHA256:240175a3a74b70fb9f6d0463042d6ef21223e2acc843e589d91ec607d52305a8
                                                        SHA512:7044b7909f48f4ff5b58b0412b573a7fef145d8c3dd24bee76c5fd215aa7addd4af9f6818426409055a7ab99cbca7d619f92205dae21de2ea108e063b269e6b0
                                                        SSDEEP:49152:XPCQNqtCSmdatQdsgUBX3B3kNC3H6vUZikr/Nxe:XPVlSmdatQSN
                                                        TLSH:21E55A917BE4DE1AE1AF2771E4B101152BB1E419A732DB8F56C0E2B82C53740AD463BF
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...K.Ng................../.........../.. ....0...@.. .......................@0...........@................................
                                                        Icon Hash:00928e8e8686b000
                                                        Entrypoint:0x6fe8be
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE
                                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x674EEA4B [Tue Dec 3 11:23:55 2024 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:4
                                                        OS Version Minor:0
                                                        File Version Major:4
                                                        File Version Minor:0
                                                        Subsystem Version Major:4
                                                        Subsystem Version Minor:0
                                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                        Instruction
                                                        jmp dword ptr [00402000h]
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x2fe8700x4b.text
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x3000000xdf7.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x3020000xc.reloc
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x20000x2fc8c40x2fca0094460e26a95e13fb78a51e6f2211338funknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rsrc0x3000000xdf70xe00f0879fac534efcb99739407818b71fe1False0.40345982142857145data5.115505372139322IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .reloc0x3020000xc0x2005297018feaf5ee2a10b3faa00fedc2e6False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_VERSION0x3000a00x2d4data0.44751381215469616
                                                        RT_MANIFEST0x3003740xa83XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.40245261984392416
                                                        DLLImport
                                                        mscoree.dll_CorExeMain
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Jan 11, 2025 08:26:59.169018984 CET497004449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:26:59.174130917 CET44494970062.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:26:59.174412012 CET497004449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:26:59.184755087 CET497004449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:26:59.189630985 CET44494970062.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:00.819358110 CET44494970062.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:00.819443941 CET497004449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:04.016324043 CET497004449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:04.020239115 CET497014449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:04.021177053 CET44494970062.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:04.025130033 CET44494970162.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:04.025222063 CET497014449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:04.030643940 CET497014449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:04.035485029 CET44494970162.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:05.658785105 CET44494970162.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:05.660598040 CET497014449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:08.689038992 CET497014449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:08.689944983 CET497234449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:08.693872929 CET44494970162.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:08.694818974 CET44494972362.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:08.694899082 CET497234449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:08.699002028 CET497234449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:08.703949928 CET44494972362.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:10.331609011 CET44494972362.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:10.331686974 CET497234449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:13.342421055 CET497234449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:13.342808962 CET497514449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:13.347451925 CET44494972362.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:13.347661972 CET44494975162.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:13.347757101 CET497514449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:13.348144054 CET497514449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:13.353075981 CET44494975162.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:14.993275881 CET44494975162.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:14.996845961 CET497514449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:18.017153978 CET497514449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:18.017646074 CET497804449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:18.022028923 CET44494975162.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:18.022485971 CET44494978062.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:18.022607088 CET497804449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:18.022995949 CET497804449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:18.027770996 CET44494978062.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:19.678870916 CET44494978062.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:19.679073095 CET497804449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:22.775563002 CET497804449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:22.776139975 CET498064449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:22.780421972 CET44494978062.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:22.781044960 CET44494980662.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:22.781106949 CET498064449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:22.781933069 CET498064449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:22.787424088 CET44494980662.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:24.427892923 CET44494980662.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:24.427992105 CET498064449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:27.435830116 CET498064449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:27.436233997 CET498384449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:27.440907001 CET44494980662.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:27.441226959 CET44494983862.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:27.441334963 CET498384449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:27.441704035 CET498384449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:27.446561098 CET44494983862.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:29.081294060 CET44494983862.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:29.081470966 CET498384449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:32.092215061 CET498384449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:32.092622042 CET498694449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:32.097011089 CET44494983862.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:32.097470999 CET44494986962.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:32.097569942 CET498694449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:32.097913027 CET498694449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:32.102720022 CET44494986962.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:33.736779928 CET44494986962.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:33.736845970 CET498694449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:36.749922991 CET498694449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:36.750291109 CET499004449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:36.754735947 CET44494986962.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:36.755119085 CET44494990062.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:36.755192041 CET499004449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:36.755570889 CET499004449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:36.760305882 CET44494990062.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:38.431489944 CET44494990062.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:38.433255911 CET499004449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:41.451653957 CET499004449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:41.452064037 CET499314449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:41.456439972 CET44494990062.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:41.456861019 CET44494993162.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:41.456938982 CET499314449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:41.457299948 CET499314449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:41.462021112 CET44494993162.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:43.099104881 CET44494993162.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:43.099195957 CET499314449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:46.107820988 CET499314449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:46.108357906 CET499584449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:46.112930059 CET44494993162.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:46.113343000 CET44494995862.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:46.113449097 CET499584449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:46.113910913 CET499584449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:46.118750095 CET44494995862.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:47.755249023 CET44494995862.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:47.755311012 CET499584449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:50.763658047 CET499584449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:50.764136076 CET499804449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:50.768469095 CET44494995862.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:50.769038916 CET44494998062.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:50.769118071 CET499804449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:50.769489050 CET499804449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:50.774223089 CET44494998062.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:52.409806013 CET44494998062.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:52.409910917 CET499804449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:55.420672894 CET499804449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:55.421106100 CET499824449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:55.427345037 CET44494998062.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:55.427817106 CET44494998262.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:55.427921057 CET499824449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:55.428322077 CET499824449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:55.435095072 CET44494998262.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:57.066284895 CET44494998262.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:57.066385984 CET499824449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:59.969552994 CET499824449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:59.970608950 CET499834449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:59.974589109 CET44494998262.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:59.975605965 CET44494998362.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:27:59.975698948 CET499834449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:59.981000900 CET499834449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:27:59.985872030 CET44494998362.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:01.613312960 CET44494998362.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:01.613600016 CET499834449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:04.060858011 CET499834449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:04.061120987 CET499844449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:04.065969944 CET44494998362.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:04.065994978 CET44494998462.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:04.066106081 CET499844449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:04.066483974 CET499844449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:04.071239948 CET44494998462.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:05.728984118 CET44494998462.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:05.729290009 CET499844449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:07.920123100 CET499844449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:07.920542002 CET499854449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:07.925132990 CET44494998462.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:07.925508976 CET44494998562.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:07.925736904 CET499854449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:07.926069021 CET499854449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:07.930896997 CET44494998562.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:09.567099094 CET44494998562.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:09.567322016 CET499854449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:11.546518087 CET499854449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:11.547195911 CET499864449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:11.551429033 CET44494998562.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:11.552134991 CET44494998662.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:11.552222013 CET499864449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:11.552936077 CET499864449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:11.557868958 CET44494998662.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:13.193325043 CET44494998662.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:13.193464041 CET499864449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:14.982530117 CET499864449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:14.982930899 CET499874449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:14.987482071 CET44494998662.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:14.987816095 CET44494998762.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:14.987894058 CET499874449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:14.988357067 CET499874449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:14.993175030 CET44494998762.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:16.632613897 CET44494998762.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:16.632850885 CET499874449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:18.233457088 CET499874449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:18.233906031 CET499884449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:18.367882967 CET44494998762.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:18.367907047 CET44494998862.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:18.368071079 CET499884449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:18.368500948 CET499884449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:18.373352051 CET44494998862.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:20.023488998 CET44494998862.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:20.023735046 CET499884449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:21.466939926 CET499884449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:21.467330933 CET499894449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:21.471859932 CET44494998862.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:21.472103119 CET44494998962.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:21.472189903 CET499894449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:21.472592115 CET499894449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:21.477416039 CET44494998962.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:23.121670961 CET44494998962.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:23.121900082 CET499894449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:24.420829058 CET499894449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:24.421204090 CET499904449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:24.425899029 CET44494998962.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:24.425997972 CET44494999062.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:24.426064014 CET499904449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:24.426466942 CET499904449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:24.431247950 CET44494999062.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:26.086555004 CET44494999062.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:26.086807966 CET499904449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:27.263802052 CET499904449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:27.264343977 CET499914449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:27.268716097 CET44494999062.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:27.269202948 CET44494999162.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:27.269295931 CET499914449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:27.269714117 CET499914449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:27.274522066 CET44494999162.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:28.910717010 CET44494999162.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:28.910866976 CET499914449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:29.967483997 CET499914449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:29.967947960 CET499924449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:29.972430944 CET44494999162.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:29.972775936 CET44494999262.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:29.972887993 CET499924449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:29.973479986 CET499924449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:29.978245974 CET44494999262.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:31.635339022 CET44494999262.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:31.635543108 CET499924449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:32.592071056 CET499924449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:32.592446089 CET499934449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:32.596957922 CET44494999262.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:32.597240925 CET44494999362.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:32.597381115 CET499934449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:32.597673893 CET499934449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:32.602397919 CET44494999362.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:34.240513086 CET44494999362.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:34.240642071 CET499934449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:35.092076063 CET499934449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:35.092434883 CET499944449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:35.097104073 CET44494999362.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:35.097387075 CET44494999462.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:35.097548008 CET499944449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:35.097831011 CET499944449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:35.102742910 CET44494999462.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:36.760363102 CET44494999462.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:36.760473967 CET499944449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:37.530555010 CET499944449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:37.531001091 CET499954449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:37.535784960 CET44494999462.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:37.535887957 CET44494999562.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:37.536015987 CET499954449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:37.536381006 CET499954449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:37.541265011 CET44494999562.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:39.178669930 CET44494999562.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:39.178828955 CET499954449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:39.938617945 CET499954449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:39.939465046 CET499964449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:39.943696022 CET44494999562.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:39.944268942 CET44494999662.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:39.944438934 CET499964449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:39.944802999 CET499964449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:39.949620008 CET44494999662.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:41.584633112 CET44494999662.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:41.584881067 CET499964449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:42.298502922 CET499964449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:42.298923969 CET499974449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:42.303502083 CET44494999662.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:42.303818941 CET44494999762.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:42.303900957 CET499974449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:42.304299116 CET499974449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:42.309060097 CET44494999762.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:43.941713095 CET44494999762.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:43.941891909 CET499974449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:44.514466047 CET499974449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:44.514837027 CET499984449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:44.519517899 CET44494999762.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:44.519938946 CET44494999862.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:44.520036936 CET499984449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:44.520514011 CET499984449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:44.525336981 CET44494999862.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:46.178276062 CET44494999862.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:46.178455114 CET499984449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:46.687628031 CET499984449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:46.688293934 CET499994449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:46.692713976 CET44494999862.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:46.693274975 CET44494999962.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:46.693423033 CET499994449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:46.694175005 CET499994449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:46.698997974 CET44494999962.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:48.336357117 CET44494999962.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:48.336575985 CET499994449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:48.795085907 CET499994449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:48.795512915 CET500004449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:48.799993992 CET44494999962.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:48.800410032 CET44495000062.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:48.800503969 CET500004449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:48.800899029 CET500004449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:48.805651903 CET44495000062.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:50.443106890 CET44495000062.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:50.443439960 CET500004449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:50.860651970 CET500004449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:50.861469030 CET500014449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:50.865529060 CET44495000062.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:50.866350889 CET44495000162.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:50.866652012 CET500014449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:50.867036104 CET500014449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:50.871906996 CET44495000162.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:52.504744053 CET44495000162.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:52.504906893 CET500014449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:52.873172045 CET500014449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:52.873528957 CET500024449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:52.878051996 CET44495000162.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:52.878386021 CET44495000262.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:52.878464937 CET500024449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:52.878844023 CET500024449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:52.883646965 CET44495000262.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:54.520421982 CET44495000262.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:54.520479918 CET500024449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:54.861531973 CET500024449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:54.862051010 CET500034449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:54.866594076 CET44495000262.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:54.867017984 CET44495000362.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:54.867149115 CET500034449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:54.867764950 CET500034449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:54.872668028 CET44495000362.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:56.529556036 CET44495000362.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:56.529632092 CET500034449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:56.842573881 CET500034449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:56.843041897 CET500044449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:56.847583055 CET44495000362.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:56.847978115 CET44495000462.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:56.848088980 CET500044449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:56.848494053 CET500044449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:56.853337049 CET44495000462.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:58.524656057 CET44495000462.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:58.524736881 CET500044449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:59.503711939 CET500044449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:59.504276991 CET500054449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:59.508635044 CET44495000462.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:59.509104013 CET44495000562.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:28:59.509166956 CET500054449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:59.510303974 CET500054449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:28:59.515038967 CET44495000562.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:29:01.145795107 CET44495000562.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:29:01.146064043 CET500054449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:29:01.388915062 CET500054449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:29:01.389378071 CET500064449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:29:01.393826008 CET44495000562.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:29:01.394187927 CET44495000662.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:29:01.394332886 CET500064449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:29:01.394651890 CET500064449192.168.2.762.60.226.26
                                                        Jan 11, 2025 08:29:01.399435997 CET44495000662.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:29:03.055938959 CET44495000662.60.226.26192.168.2.7
                                                        Jan 11, 2025 08:29:03.056036949 CET500064449192.168.2.762.60.226.26

                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Target ID:0
                                                        Start time:02:26:53
                                                        Start date:11/01/2025
                                                        Path:C:\Users\user\Desktop\rEzX7eqgfo.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Users\user\Desktop\rEzX7eqgfo.exe"
                                                        Imagebase:0x850000
                                                        File size:3'136'512 bytes
                                                        MD5 hash:8C6A99F240D978718D2F962619C23168
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_VenomRAT, Description: Yara detected VenomRAT, Source: 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_StormKitty, Description: Yara detected StormKitty Stealer, Source: 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_BrowserPasswordDump_1, Description: Yara detected BrowserPasswordDump, Source: 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Keylogger_Generic_3, Description: Yara detected Keylogger Generic, Source: 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                        • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                        • Rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex, Description: Detects executables referencing Discord tokens regular expressions, Source: 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                                        • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000000.1256211306.0000000000852000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                                        Reputation:low
                                                        Has exited:false

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:23.1%
                                                          Dynamic/Decrypted Code Coverage:100%
                                                          Signature Coverage:62.5%
                                                          Total number of Nodes:8
                                                          Total number of Limit Nodes:1
                                                          execution_graph 2230 7ffaac4945fd 2231 7ffaac494663 SetWindowsHookExW 2230->2231 2233 7ffaac4946e1 2231->2233 2225 7ffaac493ace 2227 7ffaac493aff 2225->2227 2226 7ffaac493c6b 2227->2226 2228 7ffaac493df4 NtProtectVirtualMemory 2227->2228 2229 7ffaac493e35 2228->2229

                                                          Control-flow Graph

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2529050999.00007FFAAC490000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC490000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ffaac490000_rEzX7eqgfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: ,$0&$r6$/$/$/$/$/
                                                          • API String ID: 0-1463716740
                                                          • Opcode ID: 127f10f63b0fb4ec0d6362727d9181ba144c972373bba9fa99b05ca762b1a36c
                                                          • Instruction ID: c6f0462361aa46e60a4de685d1f5e56240c71ca5c0bbbc36ca4de94771f0618d
                                                          • Opcode Fuzzy Hash: 127f10f63b0fb4ec0d6362727d9181ba144c972373bba9fa99b05ca762b1a36c
                                                          • Instruction Fuzzy Hash: 8D12B571A199198FEB98EB28C459AB973E1FF99304F148679D00FC32D6DE29EC4587C0

                                                          Control-flow Graph

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2529050999.00007FFAAC490000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC490000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ffaac490000_rEzX7eqgfo.jbxd
                                                          Similarity
                                                          • API ID: MemoryProtectVirtual
                                                          • String ID:
                                                          • API String ID: 2706961497-0
                                                          • Opcode ID: da1c88ba6d917e8f0a6c99478f724ac6a434ae48f8574d8ec1fbb888ae426d12
                                                          • Instruction ID: fb71744ccb5fa88d29e5f0b5059a21cd5cf26217c7509c05c4f46e878e46fdd4
                                                          • Opcode Fuzzy Hash: da1c88ba6d917e8f0a6c99478f724ac6a434ae48f8574d8ec1fbb888ae426d12
                                                          • Instruction Fuzzy Hash: 43C1497190CB494FE71DE778D85A5F97BE5EF96310F0485BED08AC7193DD28A80A8381

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 503 7ffaac4945fd-7ffaac49468d 506 7ffaac494693-7ffaac494698 503->506 507 7ffaac494719-7ffaac49471d 503->507 509 7ffaac49469f-7ffaac4946a0 506->509 508 7ffaac4946a2-7ffaac4946df SetWindowsHookExW 507->508 510 7ffaac4946e7-7ffaac494718 508->510 511 7ffaac4946e1 508->511 509->508 511->510
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2529050999.00007FFAAC490000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC490000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ffaac490000_rEzX7eqgfo.jbxd
                                                          Similarity
                                                          • API ID: HookWindows
                                                          • String ID:
                                                          • API String ID: 2559412058-0
                                                          • Opcode ID: 8b022c3732784b66e9f35cdf574ecbeadded6896f7f43ede0d9bb5f49c370f4f
                                                          • Instruction ID: cc09551dcf6c1c824f9d2ae080c0941a9647a6cac860010f407e93d3fc0b2791
                                                          • Opcode Fuzzy Hash: 8b022c3732784b66e9f35cdf574ecbeadded6896f7f43ede0d9bb5f49c370f4f
                                                          • Instruction Fuzzy Hash: 3841097190CA588FD709DF68C809AF97BE5EF9A310F04427EE049C3252CA69A816C7D1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2529050999.00007FFAAC490000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC490000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ffaac490000_rEzX7eqgfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 6$mR_H
                                                          • API String ID: 0-3072342643
                                                          • Opcode ID: 0057795f13dad8150650533ee6b0533738a34152d7735bb641374bd4dc373ded
                                                          • Instruction ID: 9bbbca92d992dad6e32b48e421f7f593ade1a2cf25b689ecf5892cfbe6cd958a
                                                          • Opcode Fuzzy Hash: 0057795f13dad8150650533ee6b0533738a34152d7735bb641374bd4dc373ded
                                                          • Instruction Fuzzy Hash: EFB14A62A1DA094FF31CA738D85A5F577D5EFAA224B14817ED04EC3693DC2CA8068381