Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
main.exe

Overview

General Information

Sample name:main.exe
Analysis ID:1592110
MD5:832443320b0884edc3daa5cc0df55b3e
SHA1:067c062a1795630e92c50137d9e0030e4a9d3424
SHA256:9ed451ba17c5ff6dba337c6753ba0c1bdc5bceb0dfd7969d28f0f6d6ea95ca48
Tags:exeuser-JaffaCakes118
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected suspicious sample
Installs new ROOT certificates
IP address seen in connection with other malware
PE file contains more sections than normal
PE file contains sections with non-standard names
Stores large binary data to the registry

Classification

  • System is w10x64
  • main.exe (PID: 2912 cmdline: "C:\Users\user\Desktop\main.exe" MD5: 832443320B0884EDC3DAA5CC0DF55B3E)
    • conhost.exe (PID: 5824 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.4% probability
Source: main.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Joe Sandbox ViewIP Address: 162.159.136.234 162.159.136.234
Source: Joe Sandbox ViewIP Address: 162.159.137.232 162.159.137.232
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /api/v9/gateway HTTP/1.1Host: discord.comUser-Agent: DiscordBot (https://github.com/bwmarrin/discordgo, v0.28.1)Authorization: Bot MTMyOTE0OTkxNzEyMTQ4MjgzNA.GxFFE6.Gyegwm87ad4qZkqxGYNufLELbI5i_g2tnXgSZwAccept-Encoding: gzip
Source: global trafficHTTP traffic detected: GET /?v=9&encoding=json HTTP/1.1Host: gateway.discord.ggUser-Agent: Go-http-client/1.1Accept-Encoding: zlibConnection: UpgradeSec-WebSocket-Key: RrEQqYhE5xS49FnLB9fBbw==Sec-WebSocket-Version: 13Upgrade: websocket
Source: global trafficDNS traffic detected: DNS query: discord.com
Source: global trafficDNS traffic detected: DNS query: gateway.discord.gg
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Jan 2025 18:16:08 GMTContent-Length: 0Connection: closeCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9Rq4hY3L%2Flu5EXf535kLKHnngpKkgvkBi%2FZJbtoANgCJBhdkq%2BTZknow4jjlow9eihtQtM%2BJA9xFSC2Thr5ph69Fo361z43Ln2mdVRuRhhgPcPucypVnmRZsMkyOtyWv1u1nrQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Strict-Transport-Security: max-age=31536000; includeSubDomains; preloadX-Content-Type-Options: nosniffServer: cloudflareCF-RAY: 9027daec08df729b-EWR
Source: main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/attachments/
Source: main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/avatars/
Source: main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/banners/
Source: main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/channel-icons/
Source: main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/guilds/
Source: main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/icons/
Source: main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/role-icons/
Source: main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/splashes/
Source: main.exeString found in binary or memory: https://discord.com/MESSAGE_REACTION_ADDTHREAD_MEMBER_UPDATEunmarshall
Source: main.exe, 00000000.00000002.1713957201.000000C000020000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/
Source: main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9//sticker-packs
Source: main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9//voice/
Source: main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9//voice/regions
Source: main.exe, 00000000.00000002.1713957201.000000C000020000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/09Az~~kernel32.dllREQUEST_METHODiphlpapi.dllB
Source: main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/applications
Source: main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/channels/
Source: main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/gateway
Source: main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/gateway/bot
Source: main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/guilds
Source: main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/guilds/
Source: main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/guilds/https://discord.com/api/v9/channels/https://discord.com/api/v9/use
Source: main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/oauth2/
Source: main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/oauth2/applications
Source: main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/stage-instances
Source: main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/stickers/
Source: main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/users/
Source: main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/webhooks/
Source: main.exeString found in binary or memory: https://github.com/bwmarrin/discordgo
Source: main.exe, 00000000.00000002.1713957201.000000C00001E000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://status.discord.com/api/v2/scheduled-maintenances/
Source: main.exe, 00000000.00000002.1713957201.000000C00001E000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://status.discord.com/api/v2/scheduled-maintenances/7
Source: main.exe, 00000000.00000002.1713957201.000000C000024000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://status.discord.com/api/v2/scheduled-maintenances/active.json
Source: main.exe, 00000000.00000002.1713957201.000000C000024000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://status.discord.com/api/v2/scheduled-maintenances/active.jsonhttps://status.discord.com/api/v
Source: main.exe, 00000000.00000002.1713957201.000000C000024000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://status.discord.com/api/v2/scheduled-maintenances/upcoming.json
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: main.exeStatic PE information: Number of sections : 15 > 10
Source: main.exeStatic PE information: Section: /19 ZLIB complexity 0.9992612337584216
Source: main.exeStatic PE information: Section: /32 ZLIB complexity 0.9931773190045249
Source: main.exeStatic PE information: Section: /65 ZLIB complexity 0.9991404769658929
Source: main.exeStatic PE information: Section: /78 ZLIB complexity 0.9913529563343328
Source: classification engineClassification label: mal48.winEXE@2/0@2/2
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5824:120:WilError_03
Source: main.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\main.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: main.exeString found in binary or memory: error connecting to udp addr %s, %serror sending disconnect packet, %ssuccessfully reconnected to gateway1776356839400250464677810668945312588817841970012523233890533447265625ryuFtoaFixed32 called with prec > 9reflect.MakeSlice of non-slice typepersistentalloc: align is too large/memory/classes/heap/released:bytesgreyobject: obj not pointer-alignedmismatched begin/end of activeSweepmheap.freeSpanLocked - invalid freefailed to get or create weak handleattempt to clear non-empty span setruntime: close polldesc w/o unblockruntime: inconsistent read deadlineNtCreateWaitCompletionPacket failedfindrunnable: netpoll with spinningpidleput: P has non-empty run queuetraceback did not unwind completelyruntime: createevent failed; errno=file type does not support deadlinehttp: server closed idle connectionCONTINUATION frame with stream ID 0invalid utf8 payload in close framebad successive approximation valuesSubscribeServiceChangeNotificationsunsupported signature algorithm: %vtls: too many non-advancing recordstls: server selected an invalid PSKtls: invalid Kyber server key sharemime: bogus characters after %%: %qhpack: invalid Huffman-encoded datadynamic table size update too largeflate: corrupt input before offset hash/crc32: invalid hash state sizetoo many Questions to pack (>65535)bigmod: modulus is smaller than natx509: malformed extension OID fieldx509: wrong Ed25519 public key sizex509: invalid authority info accessmlkem768: invalid ciphertext lengthcrypto/md5: invalid hash state size'_' must separate successive digitsP224 point is the point at infinityP256 point is the point at infinityP384 point is the point at infinityP521 point is the point at infinitysuperfluous leading zeros in lengthchacha20: output smaller than inputtransform: short destination bufferstrings.Builder.Grow: negative countstrings: Join output length overflowaccessing a corrupted shared libraryTime.UnmarshalBinary: invalid lengthShardID must be less than ShardCounterror dispatching internal event, %scannot specify both Embed and Embedserror reconnecting to channel %s, %serror closing session connection, %serror decoding websocket message, %ssending heartbeat in response to Op1444089209850062616169452667236328125ryuFtoaFixed64 called with prec > 180123456789abcdefghijklmnopqrstuvwxyzmethod ABI and value ABI don't alignlfstack node allocated from the heap) is larger than maximum page size (key size not a multiple of key alignruntime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlineUnable to determine system directoryruntime: VirtualQuery failed; errno=runtime: sudog with non-nil waitlinkruntime: mcall called on m->g0 stackstartm: P required for spinning=true) is not Grunnable or Gscanrunnable
Source: main.exeString found in binary or memory: error connecting to udp addr %s, %serror sending disconnect packet, %ssuccessfully reconnected to gateway1776356839400250464677810668945312588817841970012523233890533447265625ryuFtoaFixed32 called with prec > 9reflect.MakeSlice of non-slice typepersistentalloc: align is too large/memory/classes/heap/released:bytesgreyobject: obj not pointer-alignedmismatched begin/end of activeSweepmheap.freeSpanLocked - invalid freefailed to get or create weak handleattempt to clear non-empty span setruntime: close polldesc w/o unblockruntime: inconsistent read deadlineNtCreateWaitCompletionPacket failedfindrunnable: netpoll with spinningpidleput: P has non-empty run queuetraceback did not unwind completelyruntime: createevent failed; errno=file type does not support deadlinehttp: server closed idle connectionCONTINUATION frame with stream ID 0invalid utf8 payload in close framebad successive approximation valuesSubscribeServiceChangeNotificationsunsupported signature algorithm: %vtls: too many non-advancing recordstls: server selected an invalid PSKtls: invalid Kyber server key sharemime: bogus characters after %%: %qhpack: invalid Huffman-encoded datadynamic table size update too largeflate: corrupt input before offset hash/crc32: invalid hash state sizetoo many Questions to pack (>65535)bigmod: modulus is smaller than natx509: malformed extension OID fieldx509: wrong Ed25519 public key sizex509: invalid authority info accessmlkem768: invalid ciphertext lengthcrypto/md5: invalid hash state size'_' must separate successive digitsP224 point is the point at infinityP256 point is the point at infinityP384 point is the point at infinityP521 point is the point at infinitysuperfluous leading zeros in lengthchacha20: output smaller than inputtransform: short destination bufferstrings.Builder.Grow: negative countstrings: Join output length overflowaccessing a corrupted shared libraryTime.UnmarshalBinary: invalid lengthShardID must be less than ShardCounterror dispatching internal event, %scannot specify both Embed and Embedserror reconnecting to channel %s, %serror closing session connection, %serror decoding websocket message, %ssending heartbeat in response to Op1444089209850062616169452667236328125ryuFtoaFixed64 called with prec > 180123456789abcdefghijklmnopqrstuvwxyzmethod ABI and value ABI don't alignlfstack node allocated from the heap) is larger than maximum page size (key size not a multiple of key alignruntime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlineUnable to determine system directoryruntime: VirtualQuery failed; errno=runtime: sudog with non-nil waitlinkruntime: mcall called on m->g0 stackstartm: P required for spinning=true) is not Grunnable or Gscanrunnable
Source: main.exeString found in binary or memory: C:/Program Files/Go/src/net/addrselect.go
Source: unknownProcess created: C:\Users\user\Desktop\main.exe "C:\Users\user\Desktop\main.exe"
Source: C:\Users\user\Desktop\main.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\main.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: gpapi.dllJump to behavior
Source: main.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: main.exeStatic file information: File size 9881600 > 1048576
Source: main.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x2ee200
Source: main.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x317200
Source: main.exeStatic PE information: Raw size of /65 is bigger than: 0x100000 < 0x107e00
Source: main.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: main.exeStatic PE information: section name: .xdata
Source: main.exeStatic PE information: section name: /4
Source: main.exeStatic PE information: section name: /19
Source: main.exeStatic PE information: section name: /32
Source: main.exeStatic PE information: section name: /46
Source: main.exeStatic PE information: section name: /65
Source: main.exeStatic PE information: section name: /78
Source: main.exeStatic PE information: section name: /90
Source: main.exeStatic PE information: section name: .symtab

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\main.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Users\user\Desktop\main.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Users\user\Desktop\main.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Users\user\Desktop\main.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: main.exe, 00000000.00000002.1717067665.000001F02C2DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\main.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Install Root Certificate
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Modify Registry
LSASS Memory2
System Information Discovery
Remote Desktop ProtocolData from Removable Media3
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Software Packing
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive4
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture3
Ingress Tool Transfer
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
main.exe4%VirustotalBrowse
main.exe5%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
discord.com
162.159.137.232
truefalse
    high
    gateway.discord.gg
    162.159.136.234
    truefalse
      high
      NameMaliciousAntivirus DetectionReputation
      https://discord.com/api/v9/gatewayfalse
        high
        https://gateway.discord.gg/?v=9&encoding=jsonfalse
          high
          NameSourceMaliciousAntivirus DetectionReputation
          https://discord.com/api/v9/oauth2/applicationsmain.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpfalse
            high
            https://discord.com/api/v9//voice/main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpfalse
              high
              https://status.discord.com/api/v2/scheduled-maintenances/upcoming.jsonmain.exe, 00000000.00000002.1713957201.000000C000024000.00000004.00001000.00020000.00000000.sdmpfalse
                high
                https://cdn.discordapp.com/icons/main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpfalse
                  high
                  https://discord.com/api/v9/09Az~~kernel32.dllREQUEST_METHODiphlpapi.dllBmain.exe, 00000000.00000002.1713957201.000000C000020000.00000004.00001000.00020000.00000000.sdmpfalse
                    high
                    https://cdn.discordapp.com/banners/main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpfalse
                      high
                      https://cdn.discordapp.com/guilds/main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpfalse
                        high
                        https://discord.com/api/v9/oauth2/main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpfalse
                          high
                          https://discord.com/api/v9/applicationsmain.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpfalse
                            high
                            https://discord.com/api/v9/gateway/botmain.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpfalse
                              high
                              https://status.discord.com/api/v2/scheduled-maintenances/7main.exe, 00000000.00000002.1713957201.000000C00001E000.00000004.00001000.00020000.00000000.sdmpfalse
                                high
                                https://discord.com/api/v9/channels/main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpfalse
                                  high
                                  https://discord.com/api/v9/guilds/main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpfalse
                                    high
                                    https://cdn.discordapp.com/splashes/main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpfalse
                                      high
                                      https://discord.com/MESSAGE_REACTION_ADDTHREAD_MEMBER_UPDATEunmarshallmain.exefalse
                                        high
                                        https://cdn.discordapp.com/channel-icons/main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpfalse
                                          high
                                          https://github.com/bwmarrin/discordgomain.exefalse
                                            high
                                            https://cdn.discordapp.com/role-icons/main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpfalse
                                              high
                                              https://discord.com/api/v9/main.exe, 00000000.00000002.1713957201.000000C000020000.00000004.00001000.00020000.00000000.sdmpfalse
                                                high
                                                https://discord.com/api/v9/users/main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpfalse
                                                  high
                                                  https://status.discord.com/api/v2/scheduled-maintenances/main.exe, 00000000.00000002.1713957201.000000C00001E000.00000004.00001000.00020000.00000000.sdmpfalse
                                                    high
                                                    https://cdn.discordapp.com/attachments/main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpfalse
                                                      high
                                                      https://status.discord.com/api/v2/scheduled-maintenances/active.jsonmain.exe, 00000000.00000002.1713957201.000000C000024000.00000004.00001000.00020000.00000000.sdmpfalse
                                                        high
                                                        https://discord.com/api/v9/guildsmain.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpfalse
                                                          high
                                                          https://status.discord.com/api/v2/scheduled-maintenances/active.jsonhttps://status.discord.com/api/vmain.exe, 00000000.00000002.1713957201.000000C000024000.00000004.00001000.00020000.00000000.sdmpfalse
                                                            high
                                                            https://discord.com/api/v9/stickers/main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpfalse
                                                              high
                                                              https://discord.com/api/v9/webhooks/main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                high
                                                                https://cdn.discordapp.com/avatars/main.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://discord.com/api/v9/guilds/https://discord.com/api/v9/channels/https://discord.com/api/v9/usemain.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://discord.com/api/v9/stage-instancesmain.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://discord.com/api/v9//sticker-packsmain.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://discord.com/api/v9//voice/regionsmain.exe, 00000000.00000002.1713957201.000000C00001C000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                          high
                                                                          • No. of IPs < 25%
                                                                          • 25% < No. of IPs < 50%
                                                                          • 50% < No. of IPs < 75%
                                                                          • 75% < No. of IPs
                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                          162.159.136.234
                                                                          gateway.discord.ggUnited States
                                                                          13335CLOUDFLARENETUSfalse
                                                                          162.159.137.232
                                                                          discord.comUnited States
                                                                          13335CLOUDFLARENETUSfalse
                                                                          Joe Sandbox version:42.0.0 Malachite
                                                                          Analysis ID:1592110
                                                                          Start date and time:2025-01-15 19:15:12 +01:00
                                                                          Joe Sandbox product:CloudBasic
                                                                          Overall analysis duration:0h 2m 59s
                                                                          Hypervisor based Inspection enabled:false
                                                                          Report type:full
                                                                          Cookbook file name:default.jbs
                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                          Number of analysed new started processes analysed:2
                                                                          Number of new started drivers analysed:0
                                                                          Number of existing processes analysed:0
                                                                          Number of existing drivers analysed:0
                                                                          Number of injected processes analysed:0
                                                                          Technologies:
                                                                          • HCA enabled
                                                                          • EGA enabled
                                                                          • AMSI enabled
                                                                          Analysis Mode:default
                                                                          Analysis stop reason:Timeout
                                                                          Sample name:main.exe
                                                                          Detection:MAL
                                                                          Classification:mal48.winEXE@2/0@2/2
                                                                          EGA Information:Failed
                                                                          HCA Information:Failed
                                                                          Cookbook Comments:
                                                                          • Found application associated with file extension: .exe
                                                                          • Stop behavior analysis, all processes terminated
                                                                          • Execution Graph export aborted for target main.exe, PID 2912 because it is empty
                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                                          No simulations
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          162.159.136.234RobloxPlayer DevBuildV2.653.952.exeGet hashmaliciousUnknownBrowse
                                                                            gcrY4QgzW9.exeGet hashmaliciousDiscord RatBrowse
                                                                              EeXJoO1J62.exeGet hashmaliciousDiscord RatBrowse
                                                                                LDlanZur0i.exeGet hashmaliciousUnknownBrowse
                                                                                  http://relay.csgoze520.com/Get hashmaliciousUnknownBrowse
                                                                                    https://hkdiscord.antsoon.com/Get hashmaliciousUnknownBrowse
                                                                                      SecuriteInfo.com.Python.Stealer.1210.4443.27895.exeGet hashmaliciousPython Stealer, Discord Token StealerBrowse
                                                                                        http://www.cyclic.sh/pricingGet hashmaliciousHTMLPhisherBrowse
                                                                                          bang_executor.exeGet hashmaliciousDicrord RatBrowse
                                                                                            noway-2D8EB.exeGet hashmaliciousDicrord RatBrowse
                                                                                              162.159.137.232driver.exeGet hashmaliciousBlank GrabberBrowse
                                                                                                I334hDwRjj.exeGet hashmaliciousBlank Grabber, NjratBrowse
                                                                                                  paint.exeGet hashmaliciousBlank GrabberBrowse
                                                                                                    hkMUtKbCqV.exeGet hashmaliciousUnknownBrowse
                                                                                                      X9g8L63QGs.exeGet hashmaliciousBlank GrabberBrowse
                                                                                                        KpHYfxnJs6.exeGet hashmaliciousBlank GrabberBrowse
                                                                                                          9g9LZNE4bH.exeGet hashmaliciousBlank GrabberBrowse
                                                                                                            rename_me_before.exeGet hashmaliciousPython Stealer, Exela StealerBrowse
                                                                                                              arm.elfGet hashmaliciousUnknownBrowse
                                                                                                                Bloxflip Predictor.exeGet hashmaliciousNjratBrowse
                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                  discord.comRobloxPlayer DevBuildV2.653.952.exeGet hashmaliciousUnknownBrowse
                                                                                                                  • 162.159.136.232
                                                                                                                  https://runescape.games/usernames.htmlGet hashmaliciousUnknownBrowse
                                                                                                                  • 162.159.128.233
                                                                                                                  resembleC2.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
                                                                                                                  • 162.159.135.232
                                                                                                                  driver.exeGet hashmaliciousBlank GrabberBrowse
                                                                                                                  • 162.159.137.232
                                                                                                                  I334hDwRjj.exeGet hashmaliciousBlank Grabber, NjratBrowse
                                                                                                                  • 162.159.137.232
                                                                                                                  random.exeGet hashmaliciousCStealerBrowse
                                                                                                                  • 162.159.128.233
                                                                                                                  random.exeGet hashmaliciousCStealerBrowse
                                                                                                                  • 162.159.136.232
                                                                                                                  47SXvEQ.exeGet hashmaliciousBlank Grabber, XmrigBrowse
                                                                                                                  • 162.159.135.232
                                                                                                                  P3A946MOFP.exeGet hashmaliciousXWormBrowse
                                                                                                                  • 162.159.128.233
                                                                                                                  paint.exeGet hashmaliciousBlank GrabberBrowse
                                                                                                                  • 162.159.137.232
                                                                                                                  gateway.discord.ggRobloxPlayer DevBuildV2.653.952.exeGet hashmaliciousUnknownBrowse
                                                                                                                  • 162.159.136.234
                                                                                                                  arm.elfGet hashmaliciousUnknownBrowse
                                                                                                                  • 162.159.133.234
                                                                                                                  Client-built.exeGet hashmaliciousDiscord RatBrowse
                                                                                                                  • 162.159.135.234
                                                                                                                  Client-built.exeGet hashmaliciousDiscord RatBrowse
                                                                                                                  • 162.159.135.234
                                                                                                                  datXObAAn1.exeGet hashmaliciousDiscord RatBrowse
                                                                                                                  • 162.159.133.234
                                                                                                                  EeXJoO1J62.exeGet hashmaliciousDiscord RatBrowse
                                                                                                                  • 162.159.130.234
                                                                                                                  gcrY4QgzW9.exeGet hashmaliciousDiscord RatBrowse
                                                                                                                  • 162.159.136.234
                                                                                                                  datXObAAn1.exeGet hashmaliciousDiscord RatBrowse
                                                                                                                  • 162.159.135.234
                                                                                                                  XZaysgiUfm.exeGet hashmaliciousDiscord RatBrowse
                                                                                                                  • 162.159.130.234
                                                                                                                  EeXJoO1J62.exeGet hashmaliciousDiscord RatBrowse
                                                                                                                  • 162.159.136.234
                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                  CLOUDFLARENETUSRobloxPlayer DevBuildV2.653.952.exeGet hashmaliciousUnknownBrowse
                                                                                                                  • 162.159.136.232
                                                                                                                  BNXCXCJSD.jseGet hashmaliciousMassLogger RATBrowse
                                                                                                                  • 104.21.16.1
                                                                                                                  new-riii-1-b.pub.htaGet hashmaliciousLummaCBrowse
                                                                                                                  • 172.67.194.161
                                                                                                                  PO -2025918.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                                                  • 188.114.97.3
                                                                                                                  EZsrFTi.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                                                                                                  • 104.21.64.1
                                                                                                                  random.exeGet hashmaliciousLiteHTTP BotBrowse
                                                                                                                  • 104.21.21.16
                                                                                                                  NEWORDER.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                  • 104.21.96.1
                                                                                                                  https://docs.google.com/drawings/d/1Fix-5JDCTM2QJpjq3c_NOGTxMuhYRiEX3wdVSCqQc9w/preview?FwaxQGet hashmaliciousUnknownBrowse
                                                                                                                  • 104.21.79.87
                                                                                                                  DOCU800147001.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                  • 104.21.32.1
                                                                                                                  firstontario.docxGet hashmaliciousUnknownBrowse
                                                                                                                  • 1.1.1.1
                                                                                                                  CLOUDFLARENETUSRobloxPlayer DevBuildV2.653.952.exeGet hashmaliciousUnknownBrowse
                                                                                                                  • 162.159.136.232
                                                                                                                  BNXCXCJSD.jseGet hashmaliciousMassLogger RATBrowse
                                                                                                                  • 104.21.16.1
                                                                                                                  new-riii-1-b.pub.htaGet hashmaliciousLummaCBrowse
                                                                                                                  • 172.67.194.161
                                                                                                                  PO -2025918.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                                                  • 188.114.97.3
                                                                                                                  EZsrFTi.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                                                                                                  • 104.21.64.1
                                                                                                                  random.exeGet hashmaliciousLiteHTTP BotBrowse
                                                                                                                  • 104.21.21.16
                                                                                                                  NEWORDER.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                  • 104.21.96.1
                                                                                                                  https://docs.google.com/drawings/d/1Fix-5JDCTM2QJpjq3c_NOGTxMuhYRiEX3wdVSCqQc9w/preview?FwaxQGet hashmaliciousUnknownBrowse
                                                                                                                  • 104.21.79.87
                                                                                                                  DOCU800147001.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                  • 104.21.32.1
                                                                                                                  firstontario.docxGet hashmaliciousUnknownBrowse
                                                                                                                  • 1.1.1.1
                                                                                                                  No context
                                                                                                                  No context
                                                                                                                  No created / dropped files found
                                                                                                                  File type:PE32+ executable (console) x86-64, for MS Windows
                                                                                                                  Entropy (8bit):6.9199516919666415
                                                                                                                  TrID:
                                                                                                                  • Win64 Executable Console (202006/5) 92.65%
                                                                                                                  • Win64 Executable (generic) (12005/4) 5.51%
                                                                                                                  • Generic Win/DOS Executable (2004/3) 0.92%
                                                                                                                  • DOS Executable Generic (2002/1) 0.92%
                                                                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                  File name:main.exe
                                                                                                                  File size:9'881'600 bytes
                                                                                                                  MD5:832443320b0884edc3daa5cc0df55b3e
                                                                                                                  SHA1:067c062a1795630e92c50137d9e0030e4a9d3424
                                                                                                                  SHA256:9ed451ba17c5ff6dba337c6753ba0c1bdc5bceb0dfd7969d28f0f6d6ea95ca48
                                                                                                                  SHA512:8012d9f60fd7615327183e5c3f5f3fe793e4b2f2f8ec61bdddf536831bb8de75cbd3a90d25b5f5f23b3112f94a186b1894b653cd8bc9e15b648436c81fe684b0
                                                                                                                  SSDEEP:98304:tGKcRj5Pru+IMEZUVyOWvPELGTx4GY+pxq4shs:ERj5PdIlduCx3Yqqb
                                                                                                                  TLSH:2DA69D47ECA405A9D09DE630C9B69253BB717C494B3663D72B60F3392F76BC06AB9700
                                                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........ ...$...."..................F........@..............................0............`... ............................
                                                                                                                  Icon Hash:90cececece8e8eb0
                                                                                                                  Entrypoint:0x474680
                                                                                                                  Entrypoint Section:.text
                                                                                                                  Digitally signed:false
                                                                                                                  Imagebase:0x400000
                                                                                                                  Subsystem:windows cui
                                                                                                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                                                                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                                                                  Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                                                                                                                  TLS Callbacks:
                                                                                                                  CLR (.Net) Version:
                                                                                                                  OS Version Major:6
                                                                                                                  OS Version Minor:1
                                                                                                                  File Version Major:6
                                                                                                                  File Version Minor:1
                                                                                                                  Subsystem Version Major:6
                                                                                                                  Subsystem Version Minor:1
                                                                                                                  Import Hash:d42595b695fc008ef2c56aabd8efd68e
                                                                                                                  Instruction
                                                                                                                  jmp 00007F063C82DF30h
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  push ebp
                                                                                                                  dec eax
                                                                                                                  mov ebp, esp
                                                                                                                  pushfd
                                                                                                                  cld
                                                                                                                  dec eax
                                                                                                                  sub esp, 000000E0h
                                                                                                                  dec eax
                                                                                                                  mov dword ptr [esp], edi
                                                                                                                  dec eax
                                                                                                                  mov dword ptr [esp+08h], esi
                                                                                                                  dec eax
                                                                                                                  mov dword ptr [esp+10h], ebp
                                                                                                                  dec eax
                                                                                                                  mov dword ptr [esp+18h], ebx
                                                                                                                  dec esp
                                                                                                                  mov dword ptr [esp+20h], esp
                                                                                                                  dec esp
                                                                                                                  mov dword ptr [esp+28h], ebp
                                                                                                                  dec esp
                                                                                                                  mov dword ptr [esp+30h], esi
                                                                                                                  dec esp
                                                                                                                  mov dword ptr [esp+38h], edi
                                                                                                                  movups dqword ptr [esp+40h], xmm6
                                                                                                                  movups dqword ptr [esp+50h], xmm7
                                                                                                                  inc esp
                                                                                                                  movups dqword ptr [esp+60h], xmm0
                                                                                                                  inc esp
                                                                                                                  movups dqword ptr [esp+70h], xmm1
                                                                                                                  inc esp
                                                                                                                  movups dqword ptr [esp+00000080h], xmm2
                                                                                                                  inc esp
                                                                                                                  movups dqword ptr [esp+00000090h], xmm3
                                                                                                                  inc esp
                                                                                                                  movups dqword ptr [esp+000000A0h], xmm4
                                                                                                                  inc esp
                                                                                                                  movups dqword ptr [esp+000000B0h], xmm5
                                                                                                                  inc esp
                                                                                                                  movups dqword ptr [esp+000000C0h], xmm6
                                                                                                                  inc esp
                                                                                                                  movups dqword ptr [esp+000000D0h], xmm7
                                                                                                                  inc ebp
                                                                                                                  xorps xmm7, xmm7
                                                                                                                  dec ebp
                                                                                                                  xor esi, esi
                                                                                                                  dec eax
                                                                                                                  mov eax, dword ptr [00627D6Ah]
                                                                                                                  dec eax
                                                                                                                  mov eax, dword ptr [eax]
                                                                                                                  dec eax
                                                                                                                  cmp eax, 00000000h
                                                                                                                  je 00007F063C831835h
                                                                                                                  dec esp
                                                                                                                  mov esi, dword ptr [eax]
                                                                                                                  dec eax
                                                                                                                  sub esp, 10h
                                                                                                                  dec eax
                                                                                                                  mov eax, ecx
                                                                                                                  dec eax
                                                                                                                  mov ebx, edx
                                                                                                                  call 00007F063C839AEBh
                                                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x9370000x53e.idata
                                                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x6a30000x11868.pdata
                                                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x9380000xffd0.reloc
                                                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x6082600x178.data
                                                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                  .text0x10000x2ee0860x2ee200e4b7d12ead0ad7707449907284f27eccunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                  .rdata0x2f00000x3170c00x3172009e539cc43c7fdc532f55b5a61c9f49f0unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                  .data0x6080000x9a8c00x4c80035d593496e385b42ab60ec2f91564c6bFalse0.35699742136437906data4.628665227553107IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                  .pdata0x6a30000x118680x11a001348b24f7f94b1aa0cdd2cf060a1609eFalse0.3999473625886525data5.522712860690175IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                  .xdata0x6b50000xb40x20048f8802e3679540a6763a44c2e2c1af3False0.228515625shared library1.783206012798912IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                  /40x6b60000x14c0x200aaf28638a5fca2ae9b61c2d0ecb5c6e7False0.697265625data5.610479515469117IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                  /190x6b70000x81c6d0x81e00fe9520964971fdb9cb9bc36cfaf4d221False0.9992612337584216data7.995926892239023IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                  /320x7390000x1b8ee0x1ba00bc4c10175cd8337de29ef21217375c86False0.9931773190045249data7.935365574826051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                  /460x7550000x300x20040cca7c46fc713b4f088e5d440ca7931False0.103515625data0.8556848540171443IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                  /650x7560000x107ccd0x107e002f63aa5c1b178a131dc0beb99c8eea78False0.9991404769658929data7.998393972577039IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                  /780x85e0000xa6b810xa6c00530fb11817759d2686e461259b226c83False0.9913529563343328data7.99542554105543IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                  /900x9050000x3143a0x316003d7d26a83ce1513f1ff99d0dda2b8f1fFalse0.9632021360759494data7.826073349558049IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                  .idata0x9370000x53e0x600358503348e030a6484546afd82d0fe67False0.3736979166666667OpenPGP Public Key3.946664231035693IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                  .reloc0x9380000xffd00x10000b05985664c90fb2599462db2a78ae578False0.2369232177734375data5.43161210540932IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                  .symtab0x9480000x7a62b0x7a800d97cf0d507f6646e644179bc1057d046False0.20839245854591837data5.331144625726549IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                  DLLImport
                                                                                                                  kernel32.dllWriteFile, WriteConsoleW, WerSetFlags, WerGetFlags, WaitForMultipleObjects, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, TlsAlloc, SwitchToThread, SuspendThread, SetWaitableTimer, SetProcessPriorityBoost, SetEvent, SetErrorMode, SetConsoleCtrlHandler, RtlVirtualUnwind, RtlLookupFunctionEntry, ResumeThread, RaiseFailFastException, PostQueuedCompletionStatus, LoadLibraryW, LoadLibraryExW, SetThreadContext, GetThreadContext, GetSystemInfo, GetSystemDirectoryA, GetStdHandle, GetQueuedCompletionStatusEx, GetProcessAffinityMask, GetProcAddress, GetErrorMode, GetEnvironmentStringsW, GetCurrentThreadId, GetConsoleMode, FreeEnvironmentStringsW, ExitProcess, DuplicateHandle, CreateWaitableTimerExW, CreateThread, CreateIoCompletionPort, CreateEventA, CloseHandle, AddVectoredExceptionHandler, AddVectoredContinueHandler
                                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                                  Jan 15, 2025 19:16:06.701687098 CET49730443192.168.2.4162.159.137.232
                                                                                                                  Jan 15, 2025 19:16:06.701740980 CET44349730162.159.137.232192.168.2.4
                                                                                                                  Jan 15, 2025 19:16:06.701806068 CET49730443192.168.2.4162.159.137.232
                                                                                                                  Jan 15, 2025 19:16:06.702419996 CET49730443192.168.2.4162.159.137.232
                                                                                                                  Jan 15, 2025 19:16:06.702438116 CET44349730162.159.137.232192.168.2.4
                                                                                                                  Jan 15, 2025 19:16:07.379338980 CET44349730162.159.137.232192.168.2.4
                                                                                                                  Jan 15, 2025 19:16:07.379548073 CET49730443192.168.2.4162.159.137.232
                                                                                                                  Jan 15, 2025 19:16:07.379590988 CET44349730162.159.137.232192.168.2.4
                                                                                                                  Jan 15, 2025 19:16:07.379699945 CET49730443192.168.2.4162.159.137.232
                                                                                                                  Jan 15, 2025 19:16:07.379704952 CET44349730162.159.137.232192.168.2.4
                                                                                                                  Jan 15, 2025 19:16:07.380907059 CET44349730162.159.137.232192.168.2.4
                                                                                                                  Jan 15, 2025 19:16:07.380978107 CET49730443192.168.2.4162.159.137.232
                                                                                                                  Jan 15, 2025 19:16:07.425105095 CET49730443192.168.2.4162.159.137.232
                                                                                                                  Jan 15, 2025 19:16:07.425313950 CET44349730162.159.137.232192.168.2.4
                                                                                                                  Jan 15, 2025 19:16:07.425441027 CET49730443192.168.2.4162.159.137.232
                                                                                                                  Jan 15, 2025 19:16:07.425474882 CET44349730162.159.137.232192.168.2.4
                                                                                                                  Jan 15, 2025 19:16:07.472903967 CET49730443192.168.2.4162.159.137.232
                                                                                                                  Jan 15, 2025 19:16:07.546029091 CET44349730162.159.137.232192.168.2.4
                                                                                                                  Jan 15, 2025 19:16:07.546407938 CET44349730162.159.137.232192.168.2.4
                                                                                                                  Jan 15, 2025 19:16:07.546525955 CET49730443192.168.2.4162.159.137.232
                                                                                                                  Jan 15, 2025 19:16:07.546875954 CET49730443192.168.2.4162.159.137.232
                                                                                                                  Jan 15, 2025 19:16:07.546876907 CET49730443192.168.2.4162.159.137.232
                                                                                                                  Jan 15, 2025 19:16:07.546917915 CET44349730162.159.137.232192.168.2.4
                                                                                                                  Jan 15, 2025 19:16:07.546946049 CET44349730162.159.137.232192.168.2.4
                                                                                                                  Jan 15, 2025 19:16:07.558881044 CET49731443192.168.2.4162.159.136.234
                                                                                                                  Jan 15, 2025 19:16:07.558916092 CET44349731162.159.136.234192.168.2.4
                                                                                                                  Jan 15, 2025 19:16:07.559020042 CET49731443192.168.2.4162.159.136.234
                                                                                                                  Jan 15, 2025 19:16:07.559514046 CET49731443192.168.2.4162.159.136.234
                                                                                                                  Jan 15, 2025 19:16:07.559530973 CET44349731162.159.136.234192.168.2.4
                                                                                                                  Jan 15, 2025 19:16:08.239032984 CET44349731162.159.136.234192.168.2.4
                                                                                                                  Jan 15, 2025 19:16:08.242280960 CET49731443192.168.2.4162.159.136.234
                                                                                                                  Jan 15, 2025 19:16:08.242301941 CET44349731162.159.136.234192.168.2.4
                                                                                                                  Jan 15, 2025 19:16:08.242430925 CET49731443192.168.2.4162.159.136.234
                                                                                                                  Jan 15, 2025 19:16:08.242438078 CET44349731162.159.136.234192.168.2.4
                                                                                                                  Jan 15, 2025 19:16:08.244126081 CET44349731162.159.136.234192.168.2.4
                                                                                                                  Jan 15, 2025 19:16:08.244194984 CET49731443192.168.2.4162.159.136.234
                                                                                                                  Jan 15, 2025 19:16:08.251564980 CET49731443192.168.2.4162.159.136.234
                                                                                                                  Jan 15, 2025 19:16:08.251657963 CET44349731162.159.136.234192.168.2.4
                                                                                                                  Jan 15, 2025 19:16:08.251732111 CET49731443192.168.2.4162.159.136.234
                                                                                                                  Jan 15, 2025 19:16:08.251739979 CET44349731162.159.136.234192.168.2.4
                                                                                                                  Jan 15, 2025 19:16:08.307421923 CET49731443192.168.2.4162.159.136.234
                                                                                                                  Jan 15, 2025 19:16:08.414421082 CET44349731162.159.136.234192.168.2.4
                                                                                                                  Jan 15, 2025 19:16:08.414585114 CET44349731162.159.136.234192.168.2.4
                                                                                                                  Jan 15, 2025 19:16:08.414659977 CET49731443192.168.2.4162.159.136.234
                                                                                                                  Jan 15, 2025 19:16:08.415566921 CET49731443192.168.2.4162.159.136.234
                                                                                                                  Jan 15, 2025 19:16:08.415582895 CET44349731162.159.136.234192.168.2.4
                                                                                                                  Jan 15, 2025 19:16:08.415611029 CET49731443192.168.2.4162.159.136.234
                                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                                  Jan 15, 2025 19:16:06.688118935 CET4945953192.168.2.41.1.1.1
                                                                                                                  Jan 15, 2025 19:16:06.695221901 CET53494591.1.1.1192.168.2.4
                                                                                                                  Jan 15, 2025 19:16:07.547534943 CET5866153192.168.2.41.1.1.1
                                                                                                                  Jan 15, 2025 19:16:07.554862976 CET53586611.1.1.1192.168.2.4
                                                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                  Jan 15, 2025 19:16:06.688118935 CET192.168.2.41.1.1.10x3a4eStandard query (0)discord.comA (IP address)IN (0x0001)false
                                                                                                                  Jan 15, 2025 19:16:07.547534943 CET192.168.2.41.1.1.10x6226Standard query (0)gateway.discord.ggA (IP address)IN (0x0001)false
                                                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                  Jan 15, 2025 19:16:06.695221901 CET1.1.1.1192.168.2.40x3a4eNo error (0)discord.com162.159.137.232A (IP address)IN (0x0001)false
                                                                                                                  Jan 15, 2025 19:16:06.695221901 CET1.1.1.1192.168.2.40x3a4eNo error (0)discord.com162.159.128.233A (IP address)IN (0x0001)false
                                                                                                                  Jan 15, 2025 19:16:06.695221901 CET1.1.1.1192.168.2.40x3a4eNo error (0)discord.com162.159.138.232A (IP address)IN (0x0001)false
                                                                                                                  Jan 15, 2025 19:16:06.695221901 CET1.1.1.1192.168.2.40x3a4eNo error (0)discord.com162.159.136.232A (IP address)IN (0x0001)false
                                                                                                                  Jan 15, 2025 19:16:06.695221901 CET1.1.1.1192.168.2.40x3a4eNo error (0)discord.com162.159.135.232A (IP address)IN (0x0001)false
                                                                                                                  Jan 15, 2025 19:16:07.554862976 CET1.1.1.1192.168.2.40x6226No error (0)gateway.discord.gg162.159.136.234A (IP address)IN (0x0001)false
                                                                                                                  Jan 15, 2025 19:16:07.554862976 CET1.1.1.1192.168.2.40x6226No error (0)gateway.discord.gg162.159.134.234A (IP address)IN (0x0001)false
                                                                                                                  Jan 15, 2025 19:16:07.554862976 CET1.1.1.1192.168.2.40x6226No error (0)gateway.discord.gg162.159.135.234A (IP address)IN (0x0001)false
                                                                                                                  Jan 15, 2025 19:16:07.554862976 CET1.1.1.1192.168.2.40x6226No error (0)gateway.discord.gg162.159.130.234A (IP address)IN (0x0001)false
                                                                                                                  Jan 15, 2025 19:16:07.554862976 CET1.1.1.1192.168.2.40x6226No error (0)gateway.discord.gg162.159.133.234A (IP address)IN (0x0001)false
                                                                                                                  • discord.com
                                                                                                                  • gateway.discord.gg
                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  0192.168.2.449730162.159.137.2324432912C:\Users\user\Desktop\main.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  2025-01-15 18:16:07 UTC240OUTGET /api/v9/gateway HTTP/1.1
                                                                                                                  Host: discord.com
                                                                                                                  User-Agent: DiscordBot (https://github.com/bwmarrin/discordgo, v0.28.1)
                                                                                                                  Authorization: Bot MTMyOTE0OTkxNzEyMTQ4MjgzNA.GxFFE6.Gyegwm87ad4qZkqxGYNufLELbI5i_g2tnXgSZw
                                                                                                                  Accept-Encoding: gzip
                                                                                                                  2025-01-15 18:16:07 UTC1333INHTTP/1.1 200 OK
                                                                                                                  Date: Wed, 15 Jan 2025 18:16:07 GMT
                                                                                                                  Content-Type: application/json
                                                                                                                  Content-Length: 35
                                                                                                                  Connection: close
                                                                                                                  Cache-Control: public, max-age=86400, s-maxage=86400
                                                                                                                  strict-transport-security: max-age=31536000; includeSubDomains; preload
                                                                                                                  x-ratelimit-bucket: 0a6d458104b103c7be293cc9b284d9ee
                                                                                                                  x-ratelimit-limit: 100
                                                                                                                  x-ratelimit-remaining: 99
                                                                                                                  x-ratelimit-reset: 1736853315.570
                                                                                                                  x-ratelimit-reset-after: 0.010
                                                                                                                  via: 1.1 google
                                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                                  Last-Modified: Tue, 14 Jan 2025 11:15:15 GMT
                                                                                                                  CF-Cache-Status: HIT
                                                                                                                  Age: 27443
                                                                                                                  Accept-Ranges: bytes
                                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=957CsyOet23YNAeygJiX3DunjItnXFy74AX5tsY5ZtgWyvJTU4KlIgBOvgk%2By5I4BS7qU7J4CZiucQdCoJeozVDpnMOBgPpd9DZTNkqUfeApH020oqq7bWKiOXO5"}],"group":"cf-nel","max_age":604800}
                                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                  X-Content-Type-Options: nosniff
                                                                                                                  Set-Cookie: __cfruid=efc047bcea69b088d4a0c53fe1927bfcaf95b7c0-1736964967; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
                                                                                                                  Content-Security-Policy: frame-ancestors 'none'; default-src 'none'
                                                                                                                  Set-Cookie: _cfuvid=qinRiHCojakPkfV5IB10PXneXFZhVUvw8e3tqN0YVVI-1736964967498-0.0.1.1-604800000; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
                                                                                                                  Server: cloudflare
                                                                                                                  CF-RAY: 9027dae6beb343f4-EWR
                                                                                                                  2025-01-15 18:16:07 UTC35INData Raw: 7b 22 75 72 6c 22 3a 22 77 73 73 3a 2f 2f 67 61 74 65 77 61 79 2e 64 69 73 63 6f 72 64 2e 67 67 22 7d 0a
                                                                                                                  Data Ascii: {"url":"wss://gateway.discord.gg"}


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  1192.168.2.449731162.159.136.2344432912C:\Users\user\Desktop\main.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  2025-01-15 18:16:08 UTC230OUTGET /?v=9&encoding=json HTTP/1.1
                                                                                                                  Host: gateway.discord.gg
                                                                                                                  User-Agent: Go-http-client/1.1
                                                                                                                  Accept-Encoding: zlib
                                                                                                                  Connection: Upgrade
                                                                                                                  Sec-WebSocket-Key: RrEQqYhE5xS49FnLB9fBbw==
                                                                                                                  Sec-WebSocket-Version: 13
                                                                                                                  Upgrade: websocket
                                                                                                                  2025-01-15 18:16:08 UTC616INHTTP/1.1 404 Not Found
                                                                                                                  Date: Wed, 15 Jan 2025 18:16:08 GMT
                                                                                                                  Content-Length: 0
                                                                                                                  Connection: close
                                                                                                                  CF-Cache-Status: DYNAMIC
                                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9Rq4hY3L%2Flu5EXf535kLKHnngpKkgvkBi%2FZJbtoANgCJBhdkq%2BTZknow4jjlow9eihtQtM%2BJA9xFSC2Thr5ph69Fo361z43Ln2mdVRuRhhgPcPucypVnmRZsMkyOtyWv1u1nrQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                  Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                  X-Content-Type-Options: nosniff
                                                                                                                  Server: cloudflare
                                                                                                                  CF-RAY: 9027daec08df729b-EWR


                                                                                                                  Click to jump to process

                                                                                                                  Click to jump to process

                                                                                                                  Click to dive into process behavior distribution

                                                                                                                  Click to jump to process

                                                                                                                  Target ID:0
                                                                                                                  Start time:13:16:05
                                                                                                                  Start date:15/01/2025
                                                                                                                  Path:C:\Users\user\Desktop\main.exe
                                                                                                                  Wow64 process (32bit):false
                                                                                                                  Commandline:"C:\Users\user\Desktop\main.exe"
                                                                                                                  Imagebase:0xe00000
                                                                                                                  File size:9'881'600 bytes
                                                                                                                  MD5 hash:832443320B0884EDC3DAA5CC0DF55B3E
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Reputation:low
                                                                                                                  Has exited:true

                                                                                                                  Target ID:1
                                                                                                                  Start time:13:16:05
                                                                                                                  Start date:15/01/2025
                                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                                  Wow64 process (32bit):false
                                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                                  File size:862'208 bytes
                                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Reputation:high
                                                                                                                  Has exited:true

                                                                                                                  Reset < >
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1710672547.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1710502595.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1711749669.00000000010F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713245441.0000000001408000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713264715.000000000140A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713282127.000000000140B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713298841.000000000140C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713318489.000000000140D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713337215.000000000140E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713356953.0000000001410000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713374785.0000000001411000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713405242.000000000143A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713424365.000000000143D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713446327.000000000143E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713468963.000000000144C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713488948.000000000144F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713507557.0000000001451000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713526100.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713526100.0000000001457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713526100.000000000146E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713526100.0000000001474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713526100.000000000149C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713634976.00000000014A3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713634976.0000000001556000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713869135.0000000001737000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713889565.0000000001738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_e00000_main.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: cff9fe2135e67e95bb574443de1d06a8e0b8e89167aa2be6e3a61b8e8eda4513
                                                                                                                    • Instruction ID: ea880ae69ce5473c863c0c4758c04c3d63d117db3791f895516be97c86b9e773
                                                                                                                    • Opcode Fuzzy Hash: cff9fe2135e67e95bb574443de1d06a8e0b8e89167aa2be6e3a61b8e8eda4513
                                                                                                                    • Instruction Fuzzy Hash: 2D31992391CFC482D3218B24F5413AAB364F7A9784F15A315EFCC12A1ADB38E2E5CB40
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1710672547.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1710502595.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1711749669.00000000010F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713245441.0000000001408000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713264715.000000000140A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713282127.000000000140B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713298841.000000000140C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713318489.000000000140D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713337215.000000000140E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713356953.0000000001410000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713374785.0000000001411000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713405242.000000000143A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713424365.000000000143D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713446327.000000000143E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713468963.000000000144C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713488948.000000000144F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713507557.0000000001451000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713526100.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713526100.0000000001457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713526100.000000000146E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713526100.0000000001474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713526100.000000000149C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713634976.00000000014A3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713634976.0000000001556000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713869135.0000000001737000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1713889565.0000000001738000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_e00000_main.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 6e2dc365eeaf7d755159d019c6b8806dfc90132728faab9ca90f57871b6c792b
                                                                                                                    • Instruction ID: d75879d1562b432c86111a669995d7fdb8b9aeeb7a894984340f34d5a6078616
                                                                                                                    • Opcode Fuzzy Hash: 6e2dc365eeaf7d755159d019c6b8806dfc90132728faab9ca90f57871b6c792b
                                                                                                                    • Instruction Fuzzy Hash: