Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
main.exe

Overview

General Information

Sample name:main.exe
Analysis ID:1592117
MD5:95fb45d8ff76d0401499e4938aeff5e3
SHA1:e48b5c9bd62ec9fdbab7c6473a0dc2d51d18c58e
SHA256:356f16ebc0273db54a6756f85026110cecdca816bfab22eb3acd909f63956336
Tags:exeuser-JaffaCakes118
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected suspicious sample
Installs new ROOT certificates
IP address seen in connection with other malware
PE file contains more sections than normal
PE file contains sections with non-standard names
Stores large binary data to the registry

Classification

  • System is w10x64
  • main.exe (PID: 1440 cmdline: "C:\Users\user\Desktop\main.exe" MD5: 95FB45D8FF76D0401499E4938AEFF5E3)
    • conhost.exe (PID: 432 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.3% probability
Source: main.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Joe Sandbox ViewIP Address: 162.159.133.234 162.159.133.234
Source: Joe Sandbox ViewIP Address: 162.159.135.232 162.159.135.232
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /api/v9/gateway HTTP/1.1Host: discord.comUser-Agent: DiscordBot (https://github.com/bwmarrin/discordgo, v0.28.1)Authorization: Bot MTMyOTE1MzA2MjAzNTUyNTczNQ.GBlPSk.65ejGNMtJ75aP7ZZJhBWYoPIN-p7uvw3vy95egAccept-Encoding: gzip
Source: global trafficHTTP traffic detected: GET /?v=9&encoding=json HTTP/1.1Host: gateway.discord.ggUser-Agent: Go-http-client/1.1Accept-Encoding: zlibConnection: UpgradeSec-WebSocket-Key: yQz05quw2GMcxQzzDAEY8A==Sec-WebSocket-Version: 13Upgrade: websocket
Source: global trafficDNS traffic detected: DNS query: discord.com
Source: global trafficDNS traffic detected: DNS query: gateway.discord.gg
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Jan 2025 18:40:09 GMTContent-Length: 0Connection: closeCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=jfkNzBRdOklNWds8y1fIiErYOgpkrV4Z8bLdMxzu91q0YVqOH%2Fnp6ULXAsmAOtgqPt3UMsrOPECRaJDDAO42j%2FhCypXmwlMgaSI8Nz37ubcn5v0r1xZY%2BW6t7dVxOAU%2FPNEaIg%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Strict-Transport-Security: max-age=31536000; includeSubDomains; preloadX-Content-Type-Options: nosniffServer: cloudflareCF-RAY: 9027fe182dca32ca-EWR
Source: main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/attachments/
Source: main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/avatars/
Source: main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/banners/
Source: main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/channel-icons/
Source: main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/guilds/
Source: main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/icons/
Source: main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/role-icons/
Source: main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/splashes/
Source: main.exeString found in binary or memory: https://discord.com/MESSAGE_REACTION_ADDTHREAD_MEMBER_UPDATEunmarshall
Source: main.exe, 00000000.00000002.2121725257.000000C000188000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/
Source: main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9//sticker-packs
Source: main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9//voice/
Source: main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9//voice/regions
Source: main.exe, 00000000.00000002.2121725257.000000C000188000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/09Az~~kernel32.dllREQUEST_METHODiphlpapi.dll
Source: main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/applications
Source: main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/channels/
Source: main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/gateway
Source: main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/gateway/bot
Source: main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/guilds
Source: main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/guilds/
Source: main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/guilds/https://discord.com/api/v9/channels/https://discord.com/api/v9/use
Source: main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/oauth2/
Source: main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/oauth2/applications
Source: main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/stage-instances
Source: main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/stickers/
Source: main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/users/
Source: main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/webhooks/
Source: main.exeString found in binary or memory: https://github.com/bwmarrin/discordgo
Source: main.exe, 00000000.00000002.2121725257.000000C0001BE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://status.discord.com/api/v2/scheduled-maintenances/
Source: main.exe, 00000000.00000002.2121725257.000000C0001BE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://status.discord.com/api/v2/scheduled-maintenances/D
Source: main.exe, 00000000.00000002.2121725257.000000C0001C0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://status.discord.com/api/v2/scheduled-maintenances/active.json
Source: main.exe, 00000000.00000002.2121725257.000000C0001C0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://status.discord.com/api/v2/scheduled-maintenances/active.jsonhttps://status.discord.com/api/v
Source: main.exe, 00000000.00000002.2121725257.000000C0001C0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://status.discord.com/api/v2/scheduled-maintenances/upcoming.json
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
Source: main.exeStatic PE information: Number of sections : 15 > 10
Source: main.exeStatic PE information: Section: /19 ZLIB complexity 0.9997105089027911
Source: main.exeStatic PE information: Section: /32 ZLIB complexity 0.9944322680995475
Source: main.exeStatic PE information: Section: /65 ZLIB complexity 0.9992629542495265
Source: main.exeStatic PE information: Section: /78 ZLIB complexity 0.9907113854244229
Source: classification engineClassification label: mal48.winEXE@2/0@2/2
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:432:120:WilError_03
Source: main.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\main.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: main.exeString found in binary or memory: error connecting to udp addr %s, %serror sending disconnect packet, %ssuccessfully reconnected to gateway1776356839400250464677810668945312588817841970012523233890533447265625ryuFtoaFixed32 called with prec > 9reflect.MakeSlice of non-slice typepersistentalloc: align is too large/memory/classes/heap/released:bytesgreyobject: obj not pointer-alignedmismatched begin/end of activeSweepmheap.freeSpanLocked - invalid freefailed to get or create weak handleattempt to clear non-empty span setruntime: close polldesc w/o unblockruntime: inconsistent read deadlineNtCreateWaitCompletionPacket failedfindrunnable: netpoll with spinningpidleput: P has non-empty run queuetraceback did not unwind completelyruntime: createevent failed; errno=2006-01-02T15:04:05.999999999Z07:00non-positive interval for NewTickernetwork dropped connection on resettransport endpoint is not connectedfile type does not support deadlinehttp: server closed idle connectionCONTINUATION frame with stream ID 0invalid utf8 payload in close framebad successive approximation valuesSubscribeServiceChangeNotificationsunsupported signature algorithm: %vtls: too many non-advancing recordstls: server selected an invalid PSKtls: invalid Kyber server key sharemime: bogus characters after %%: %qhpack: invalid Huffman-encoded datadynamic table size update too largeflate: corrupt input before offset hash/crc32: invalid hash state sizetoo many Questions to pack (>65535)bigmod: modulus is smaller than natx509: malformed extension OID fieldx509: wrong Ed25519 public key sizex509: invalid authority info accessmlkem768: invalid ciphertext lengthcrypto/md5: invalid hash state size'_' must separate successive digitsP224 point is the point at infinityP256 point is the point at infinityP384 point is the point at infinityP521 point is the point at infinitysuperfluous leading zeros in lengthchacha20: output smaller than inputtransform: short destination bufferstrings.Builder.Grow: negative countstrings: Join output length overflowShardID must be less than ShardCounterror dispatching internal event, %scannot specify both Embed and Embedserror reconnecting to channel %s, %serror closing session connection, %serror decoding websocket message, %ssending heartbeat in response to Op1444089209850062616169452667236328125ryuFtoaFixed64 called with prec > 180123456789abcdefghijklmnopqrstuvwxyzmethod ABI and value ABI don't alignlfstack node allocated from the heap) is larger than maximum page size (key size not a multiple of key alignruntime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlineUnable to determine system directoryruntime: VirtualQuery failed; errno=runtime: sudog with non-nil waitlinkruntime: mcall called on m->g0 stackstartm: P required for spinning=true) is not Grunnable or Gscanrunn
Source: main.exeString found in binary or memory: error connecting to udp addr %s, %serror sending disconnect packet, %ssuccessfully reconnected to gateway1776356839400250464677810668945312588817841970012523233890533447265625ryuFtoaFixed32 called with prec > 9reflect.MakeSlice of non-slice typepersistentalloc: align is too large/memory/classes/heap/released:bytesgreyobject: obj not pointer-alignedmismatched begin/end of activeSweepmheap.freeSpanLocked - invalid freefailed to get or create weak handleattempt to clear non-empty span setruntime: close polldesc w/o unblockruntime: inconsistent read deadlineNtCreateWaitCompletionPacket failedfindrunnable: netpoll with spinningpidleput: P has non-empty run queuetraceback did not unwind completelyruntime: createevent failed; errno=2006-01-02T15:04:05.999999999Z07:00non-positive interval for NewTickernetwork dropped connection on resettransport endpoint is not connectedfile type does not support deadlinehttp: server closed idle connectionCONTINUATION frame with stream ID 0invalid utf8 payload in close framebad successive approximation valuesSubscribeServiceChangeNotificationsunsupported signature algorithm: %vtls: too many non-advancing recordstls: server selected an invalid PSKtls: invalid Kyber server key sharemime: bogus characters after %%: %qhpack: invalid Huffman-encoded datadynamic table size update too largeflate: corrupt input before offset hash/crc32: invalid hash state sizetoo many Questions to pack (>65535)bigmod: modulus is smaller than natx509: malformed extension OID fieldx509: wrong Ed25519 public key sizex509: invalid authority info accessmlkem768: invalid ciphertext lengthcrypto/md5: invalid hash state size'_' must separate successive digitsP224 point is the point at infinityP256 point is the point at infinityP384 point is the point at infinityP521 point is the point at infinitysuperfluous leading zeros in lengthchacha20: output smaller than inputtransform: short destination bufferstrings.Builder.Grow: negative countstrings: Join output length overflowShardID must be less than ShardCounterror dispatching internal event, %scannot specify both Embed and Embedserror reconnecting to channel %s, %serror closing session connection, %serror decoding websocket message, %ssending heartbeat in response to Op1444089209850062616169452667236328125ryuFtoaFixed64 called with prec > 180123456789abcdefghijklmnopqrstuvwxyzmethod ABI and value ABI don't alignlfstack node allocated from the heap) is larger than maximum page size (key size not a multiple of key alignruntime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlineUnable to determine system directoryruntime: VirtualQuery failed; errno=runtime: sudog with non-nil waitlinkruntime: mcall called on m->g0 stackstartm: P required for spinning=true) is not Grunnable or Gscanrunn
Source: main.exeString found in binary or memory: C:/Program Files/Go/src/net/addrselect.go
Source: unknownProcess created: C:\Users\user\Desktop\main.exe "C:\Users\user\Desktop\main.exe"
Source: C:\Users\user\Desktop\main.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\main.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: gpapi.dllJump to behavior
Source: main.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: main.exeStatic file information: File size 9889280 > 1048576
Source: main.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x2eee00
Source: main.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x318000
Source: main.exeStatic PE information: Raw size of /65 is bigger than: 0x100000 < 0x108000
Source: main.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: main.exeStatic PE information: section name: .xdata
Source: main.exeStatic PE information: section name: /4
Source: main.exeStatic PE information: section name: /19
Source: main.exeStatic PE information: section name: /32
Source: main.exeStatic PE information: section name: /46
Source: main.exeStatic PE information: section name: /65
Source: main.exeStatic PE information: section name: /78
Source: main.exeStatic PE information: section name: /90
Source: main.exeStatic PE information: section name: .symtab

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\main.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Users\user\Desktop\main.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Users\user\Desktop\main.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Users\user\Desktop\main.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: main.exe, 00000000.00000002.2122614877.0000015D75A7C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\main.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Install Root Certificate
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Modify Registry
LSASS Memory2
System Information Discovery
Remote Desktop ProtocolData from Removable Media3
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Software Packing
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive4
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture3
Ingress Tool Transfer
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
main.exe6%VirustotalBrowse
main.exe5%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
discord.com
162.159.135.232
truefalse
    high
    gateway.discord.gg
    162.159.133.234
    truefalse
      high
      NameMaliciousAntivirus DetectionReputation
      https://discord.com/api/v9/gatewayfalse
        high
        https://gateway.discord.gg/?v=9&encoding=jsonfalse
          high
          NameSourceMaliciousAntivirus DetectionReputation
          https://discord.com/api/v9/oauth2/applicationsmain.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpfalse
            high
            https://discord.com/api/v9//voice/main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpfalse
              high
              https://status.discord.com/api/v2/scheduled-maintenances/upcoming.jsonmain.exe, 00000000.00000002.2121725257.000000C0001C0000.00000004.00001000.00020000.00000000.sdmpfalse
                high
                https://cdn.discordapp.com/icons/main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpfalse
                  high
                  https://status.discord.com/api/v2/scheduled-maintenances/Dmain.exe, 00000000.00000002.2121725257.000000C0001BE000.00000004.00001000.00020000.00000000.sdmpfalse
                    high
                    https://cdn.discordapp.com/banners/main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpfalse
                      high
                      https://cdn.discordapp.com/guilds/main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpfalse
                        high
                        https://discord.com/api/v9/oauth2/main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpfalse
                          high
                          https://discord.com/api/v9/applicationsmain.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpfalse
                            high
                            https://discord.com/api/v9/gateway/botmain.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpfalse
                              high
                              https://discord.com/api/v9/channels/main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpfalse
                                high
                                https://discord.com/api/v9/guilds/main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpfalse
                                  high
                                  https://cdn.discordapp.com/splashes/main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpfalse
                                    high
                                    https://discord.com/MESSAGE_REACTION_ADDTHREAD_MEMBER_UPDATEunmarshallmain.exefalse
                                      high
                                      https://cdn.discordapp.com/channel-icons/main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpfalse
                                        high
                                        https://github.com/bwmarrin/discordgomain.exefalse
                                          high
                                          https://cdn.discordapp.com/role-icons/main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpfalse
                                            high
                                            https://discord.com/api/v9/main.exe, 00000000.00000002.2121725257.000000C000188000.00000004.00001000.00020000.00000000.sdmpfalse
                                              high
                                              https://discord.com/api/v9/users/main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpfalse
                                                high
                                                https://status.discord.com/api/v2/scheduled-maintenances/main.exe, 00000000.00000002.2121725257.000000C0001BE000.00000004.00001000.00020000.00000000.sdmpfalse
                                                  high
                                                  https://cdn.discordapp.com/attachments/main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpfalse
                                                    high
                                                    https://status.discord.com/api/v2/scheduled-maintenances/active.jsonmain.exe, 00000000.00000002.2121725257.000000C0001C0000.00000004.00001000.00020000.00000000.sdmpfalse
                                                      high
                                                      https://discord.com/api/v9/09Az~~kernel32.dllREQUEST_METHODiphlpapi.dllmain.exe, 00000000.00000002.2121725257.000000C000188000.00000004.00001000.00020000.00000000.sdmpfalse
                                                        high
                                                        https://discord.com/api/v9/guildsmain.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpfalse
                                                          high
                                                          https://status.discord.com/api/v2/scheduled-maintenances/active.jsonhttps://status.discord.com/api/vmain.exe, 00000000.00000002.2121725257.000000C0001C0000.00000004.00001000.00020000.00000000.sdmpfalse
                                                            high
                                                            https://discord.com/api/v9/stickers/main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpfalse
                                                              high
                                                              https://discord.com/api/v9/webhooks/main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                high
                                                                https://cdn.discordapp.com/avatars/main.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://discord.com/api/v9/guilds/https://discord.com/api/v9/channels/https://discord.com/api/v9/usemain.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://discord.com/api/v9/stage-instancesmain.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://discord.com/api/v9//sticker-packsmain.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://discord.com/api/v9//voice/regionsmain.exe, 00000000.00000002.2121725257.000000C0001AA000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                          high
                                                                          • No. of IPs < 25%
                                                                          • 25% < No. of IPs < 50%
                                                                          • 50% < No. of IPs < 75%
                                                                          • 75% < No. of IPs
                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                          162.159.133.234
                                                                          gateway.discord.ggUnited States
                                                                          13335CLOUDFLARENETUSfalse
                                                                          162.159.135.232
                                                                          discord.comUnited States
                                                                          13335CLOUDFLARENETUSfalse
                                                                          Joe Sandbox version:42.0.0 Malachite
                                                                          Analysis ID:1592117
                                                                          Start date and time:2025-01-15 19:39:10 +01:00
                                                                          Joe Sandbox product:CloudBasic
                                                                          Overall analysis duration:0h 3m 1s
                                                                          Hypervisor based Inspection enabled:false
                                                                          Report type:full
                                                                          Cookbook file name:default.jbs
                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                          Number of analysed new started processes analysed:3
                                                                          Number of new started drivers analysed:0
                                                                          Number of existing processes analysed:0
                                                                          Number of existing drivers analysed:0
                                                                          Number of injected processes analysed:0
                                                                          Technologies:
                                                                          • HCA enabled
                                                                          • EGA enabled
                                                                          • AMSI enabled
                                                                          Analysis Mode:default
                                                                          Analysis stop reason:Timeout
                                                                          Sample name:main.exe
                                                                          Detection:MAL
                                                                          Classification:mal48.winEXE@2/0@2/2
                                                                          EGA Information:Failed
                                                                          HCA Information:Failed
                                                                          Cookbook Comments:
                                                                          • Found application associated with file extension: .exe
                                                                          • Stop behavior analysis, all processes terminated
                                                                          • Exclude process from analysis (whitelisted): dllhost.exe
                                                                          • Excluded IPs from analysis (whitelisted): 13.107.246.45
                                                                          • Excluded domains from analysis (whitelisted): otelrules.azureedge.net
                                                                          • Execution Graph export aborted for target main.exe, PID 1440 because it is empty
                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                                          No simulations
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          162.159.133.234skyljne.mpsl.elfGet hashmaliciousMiraiBrowse
                                                                          • /goform/set_LimitClient_cfg
                                                                          162.159.135.232S23UhdW5DH.exeGet hashmaliciousLummaC, Glupteba, SmokeLoader, Socks5Systemz, StealcBrowse
                                                                          • discord.com/admin.php
                                                                          18561381.exeGet hashmaliciousRedLineBrowse
                                                                          • discord.com/channels/948610961449816084/948610961449816086/948611091527774228
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          discord.commain old source new token.exeGet hashmaliciousUnknownBrowse
                                                                          • 162.159.128.233
                                                                          main.exeGet hashmaliciousUnknownBrowse
                                                                          • 162.159.137.232
                                                                          RobloxPlayer DevBuildV2.653.952.exeGet hashmaliciousUnknownBrowse
                                                                          • 162.159.136.232
                                                                          https://runescape.games/usernames.htmlGet hashmaliciousUnknownBrowse
                                                                          • 162.159.128.233
                                                                          resembleC2.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
                                                                          • 162.159.135.232
                                                                          driver.exeGet hashmaliciousBlank GrabberBrowse
                                                                          • 162.159.137.232
                                                                          I334hDwRjj.exeGet hashmaliciousBlank Grabber, NjratBrowse
                                                                          • 162.159.137.232
                                                                          random.exeGet hashmaliciousCStealerBrowse
                                                                          • 162.159.128.233
                                                                          random.exeGet hashmaliciousCStealerBrowse
                                                                          • 162.159.136.232
                                                                          47SXvEQ.exeGet hashmaliciousBlank Grabber, XmrigBrowse
                                                                          • 162.159.135.232
                                                                          gateway.discord.ggmain old source new token.exeGet hashmaliciousUnknownBrowse
                                                                          • 162.159.133.234
                                                                          main.exeGet hashmaliciousUnknownBrowse
                                                                          • 162.159.136.234
                                                                          RobloxPlayer DevBuildV2.653.952.exeGet hashmaliciousUnknownBrowse
                                                                          • 162.159.136.234
                                                                          arm.elfGet hashmaliciousUnknownBrowse
                                                                          • 162.159.133.234
                                                                          Client-built.exeGet hashmaliciousDiscord RatBrowse
                                                                          • 162.159.135.234
                                                                          Client-built.exeGet hashmaliciousDiscord RatBrowse
                                                                          • 162.159.135.234
                                                                          datXObAAn1.exeGet hashmaliciousDiscord RatBrowse
                                                                          • 162.159.133.234
                                                                          EeXJoO1J62.exeGet hashmaliciousDiscord RatBrowse
                                                                          • 162.159.130.234
                                                                          gcrY4QgzW9.exeGet hashmaliciousDiscord RatBrowse
                                                                          • 162.159.136.234
                                                                          datXObAAn1.exeGet hashmaliciousDiscord RatBrowse
                                                                          • 162.159.135.234
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          CLOUDFLARENETUSmain old source new token.exeGet hashmaliciousUnknownBrowse
                                                                          • 162.159.133.234
                                                                          main.exeGet hashmaliciousUnknownBrowse
                                                                          • 162.159.137.232
                                                                          RobloxPlayer DevBuildV2.653.952.exeGet hashmaliciousUnknownBrowse
                                                                          • 162.159.136.232
                                                                          BNXCXCJSD.jseGet hashmaliciousMassLogger RATBrowse
                                                                          • 104.21.16.1
                                                                          new-riii-1-b.pub.htaGet hashmaliciousLummaCBrowse
                                                                          • 172.67.194.161
                                                                          PO -2025918.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                          • 188.114.97.3
                                                                          EZsrFTi.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                                                          • 104.21.64.1
                                                                          random.exeGet hashmaliciousLiteHTTP BotBrowse
                                                                          • 104.21.21.16
                                                                          NEWORDER.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 104.21.96.1
                                                                          https://docs.google.com/drawings/d/1Fix-5JDCTM2QJpjq3c_NOGTxMuhYRiEX3wdVSCqQc9w/preview?FwaxQGet hashmaliciousUnknownBrowse
                                                                          • 104.21.79.87
                                                                          CLOUDFLARENETUSmain old source new token.exeGet hashmaliciousUnknownBrowse
                                                                          • 162.159.133.234
                                                                          main.exeGet hashmaliciousUnknownBrowse
                                                                          • 162.159.137.232
                                                                          RobloxPlayer DevBuildV2.653.952.exeGet hashmaliciousUnknownBrowse
                                                                          • 162.159.136.232
                                                                          BNXCXCJSD.jseGet hashmaliciousMassLogger RATBrowse
                                                                          • 104.21.16.1
                                                                          new-riii-1-b.pub.htaGet hashmaliciousLummaCBrowse
                                                                          • 172.67.194.161
                                                                          PO -2025918.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                          • 188.114.97.3
                                                                          EZsrFTi.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                                                          • 104.21.64.1
                                                                          random.exeGet hashmaliciousLiteHTTP BotBrowse
                                                                          • 104.21.21.16
                                                                          NEWORDER.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 104.21.96.1
                                                                          https://docs.google.com/drawings/d/1Fix-5JDCTM2QJpjq3c_NOGTxMuhYRiEX3wdVSCqQc9w/preview?FwaxQGet hashmaliciousUnknownBrowse
                                                                          • 104.21.79.87
                                                                          No context
                                                                          No context
                                                                          No created / dropped files found
                                                                          File type:PE32+ executable (console) x86-64, for MS Windows
                                                                          Entropy (8bit):6.920357838025818
                                                                          TrID:
                                                                          • Win64 Executable Console (202006/5) 92.65%
                                                                          • Win64 Executable (generic) (12005/4) 5.51%
                                                                          • Generic Win/DOS Executable (2004/3) 0.92%
                                                                          • DOS Executable Generic (2002/1) 0.92%
                                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                          File name:main.exe
                                                                          File size:9'889'280 bytes
                                                                          MD5:95fb45d8ff76d0401499e4938aeff5e3
                                                                          SHA1:e48b5c9bd62ec9fdbab7c6473a0dc2d51d18c58e
                                                                          SHA256:356f16ebc0273db54a6756f85026110cecdca816bfab22eb3acd909f63956336
                                                                          SHA512:f498d2d135ab025285fd4777e1a6c77c4387a27ab285a6170852dc2e765f546498d0d91e82cd9a5774d6153bf9c13c355a517c5d4f0c0ed794ee2a2002ebfec1
                                                                          SSDEEP:98304:sAMc35NfpwEtUVygWCx3cH3wg1GJZbdrVF7ge9wNvIDZyvz:/35NDA3cH3H8X77EIo
                                                                          TLSH:61A68C47EC9505E9D1ADA630CAB292537B717C494B3623D32B60B3393F76BD0AA79700
                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........<...$...."..................F........@..............................0............`... ............................
                                                                          Icon Hash:00928e8e8686b000
                                                                          Entrypoint:0x474680
                                                                          Entrypoint Section:.text
                                                                          Digitally signed:false
                                                                          Imagebase:0x400000
                                                                          Subsystem:windows cui
                                                                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                          Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                                                                          TLS Callbacks:
                                                                          CLR (.Net) Version:
                                                                          OS Version Major:6
                                                                          OS Version Minor:1
                                                                          File Version Major:6
                                                                          File Version Minor:1
                                                                          Subsystem Version Major:6
                                                                          Subsystem Version Minor:1
                                                                          Import Hash:d42595b695fc008ef2c56aabd8efd68e
                                                                          Instruction
                                                                          jmp 00007FA1386CE980h
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          push ebp
                                                                          dec eax
                                                                          mov ebp, esp
                                                                          pushfd
                                                                          cld
                                                                          dec eax
                                                                          sub esp, 000000E0h
                                                                          dec eax
                                                                          mov dword ptr [esp], edi
                                                                          dec eax
                                                                          mov dword ptr [esp+08h], esi
                                                                          dec eax
                                                                          mov dword ptr [esp+10h], ebp
                                                                          dec eax
                                                                          mov dword ptr [esp+18h], ebx
                                                                          dec esp
                                                                          mov dword ptr [esp+20h], esp
                                                                          dec esp
                                                                          mov dword ptr [esp+28h], ebp
                                                                          dec esp
                                                                          mov dword ptr [esp+30h], esi
                                                                          dec esp
                                                                          mov dword ptr [esp+38h], edi
                                                                          movups dqword ptr [esp+40h], xmm6
                                                                          movups dqword ptr [esp+50h], xmm7
                                                                          inc esp
                                                                          movups dqword ptr [esp+60h], xmm0
                                                                          inc esp
                                                                          movups dqword ptr [esp+70h], xmm1
                                                                          inc esp
                                                                          movups dqword ptr [esp+00000080h], xmm2
                                                                          inc esp
                                                                          movups dqword ptr [esp+00000090h], xmm3
                                                                          inc esp
                                                                          movups dqword ptr [esp+000000A0h], xmm4
                                                                          inc esp
                                                                          movups dqword ptr [esp+000000B0h], xmm5
                                                                          inc esp
                                                                          movups dqword ptr [esp+000000C0h], xmm6
                                                                          inc esp
                                                                          movups dqword ptr [esp+000000D0h], xmm7
                                                                          inc ebp
                                                                          xorps xmm7, xmm7
                                                                          dec ebp
                                                                          xor esi, esi
                                                                          dec eax
                                                                          mov eax, dword ptr [00627D6Ah]
                                                                          dec eax
                                                                          mov eax, dword ptr [eax]
                                                                          dec eax
                                                                          cmp eax, 00000000h
                                                                          je 00007FA1386D2285h
                                                                          dec esp
                                                                          mov esi, dword ptr [eax]
                                                                          dec eax
                                                                          sub esp, 10h
                                                                          dec eax
                                                                          mov eax, ecx
                                                                          dec eax
                                                                          mov ebx, edx
                                                                          call 00007FA1386DA53Bh
                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x9370000x53e.idata
                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x6a30000x118ec.pdata
                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x9380000x10000.reloc
                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x6082600x178.data
                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                          .text0x10000x2eecd80x2eee00000047996968640f7b0b78ebc5689e71unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                          .rdata0x2f00000x317e500x318000b0ecb5f03100481e1d2c3037358a521bunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          .data0x6080000x9a8c00x4c80005af717e17bf3f73bf4a8e2d923a44ffFalse0.35705167483660133data4.628891793135523IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .pdata0x6a30000x118ec0x11a00184644d0f74b3982c74002c35a41ccbcFalse0.4007784796099291data5.529608716072925IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          .xdata0x6b50000xb40x20048f8802e3679540a6763a44c2e2c1af3False0.228515625shared library1.783206012798912IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          /40x6b60000x14c0x200aaf28638a5fca2ae9b61c2d0ecb5c6e7False0.697265625data5.610479515469117IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                          /190x6b70000x81d490x81e00cea952451e2a73141ab846e0c99417c2False0.9997105089027911data7.995787645246241IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                          /320x7390000x1b9690x1ba00b5fa6504ef00a99532148229a00e0722False0.9944322680995475data7.935231619375088IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                          /460x7550000x300x20040cca7c46fc713b4f088e5d440ca7931False0.103515625data0.8556848540171443IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                          /650x7560000x107f2c0x1080005ec1587f454c2d93e513e9b42932322aFalse0.9992629542495265data7.998304626449673IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                          /780x85e0000xa7c5e0xa7e00fc843905bc0f120f23680534c3484684False0.9907113854244229data7.995069428767791IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                          /900x9060000x303e10x3040097b9edc9902108e01eaca0404f713db7False0.9758338730569949data7.8131826765425IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                          .idata0x9370000x53e0x600358503348e030a6484546afd82d0fe67False0.3736979166666667OpenPGP Public Key3.946664231035693IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .reloc0x9380000x100000x1000087a9954fda50225a6d8c5c15512a5e89False0.237640380859375data5.435171296798967IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                          .symtab0x9480000x7a8630x7aa00f1cf5a85187f78cc9a637fac8e810e11False0.20851849197247707data5.331527389556275IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                          DLLImport
                                                                          kernel32.dllWriteFile, WriteConsoleW, WerSetFlags, WerGetFlags, WaitForMultipleObjects, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, TlsAlloc, SwitchToThread, SuspendThread, SetWaitableTimer, SetProcessPriorityBoost, SetEvent, SetErrorMode, SetConsoleCtrlHandler, RtlVirtualUnwind, RtlLookupFunctionEntry, ResumeThread, RaiseFailFastException, PostQueuedCompletionStatus, LoadLibraryW, LoadLibraryExW, SetThreadContext, GetThreadContext, GetSystemInfo, GetSystemDirectoryA, GetStdHandle, GetQueuedCompletionStatusEx, GetProcessAffinityMask, GetProcAddress, GetErrorMode, GetEnvironmentStringsW, GetCurrentThreadId, GetConsoleMode, FreeEnvironmentStringsW, ExitProcess, DuplicateHandle, CreateWaitableTimerExW, CreateThread, CreateIoCompletionPort, CreateEventA, CloseHandle, AddVectoredExceptionHandler, AddVectoredContinueHandler
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Jan 15, 2025 19:40:07.303531885 CET49705443192.168.2.5162.159.135.232
                                                                          Jan 15, 2025 19:40:07.303581953 CET44349705162.159.135.232192.168.2.5
                                                                          Jan 15, 2025 19:40:07.303689003 CET49705443192.168.2.5162.159.135.232
                                                                          Jan 15, 2025 19:40:07.304316044 CET49705443192.168.2.5162.159.135.232
                                                                          Jan 15, 2025 19:40:07.304354906 CET44349705162.159.135.232192.168.2.5
                                                                          Jan 15, 2025 19:40:08.024522066 CET44349705162.159.135.232192.168.2.5
                                                                          Jan 15, 2025 19:40:08.024811029 CET49705443192.168.2.5162.159.135.232
                                                                          Jan 15, 2025 19:40:08.024842978 CET44349705162.159.135.232192.168.2.5
                                                                          Jan 15, 2025 19:40:08.024931908 CET49705443192.168.2.5162.159.135.232
                                                                          Jan 15, 2025 19:40:08.024940014 CET44349705162.159.135.232192.168.2.5
                                                                          Jan 15, 2025 19:40:08.026947975 CET44349705162.159.135.232192.168.2.5
                                                                          Jan 15, 2025 19:40:08.027035952 CET49705443192.168.2.5162.159.135.232
                                                                          Jan 15, 2025 19:40:08.069487095 CET49705443192.168.2.5162.159.135.232
                                                                          Jan 15, 2025 19:40:08.069487095 CET49705443192.168.2.5162.159.135.232
                                                                          Jan 15, 2025 19:40:08.069875956 CET44349705162.159.135.232192.168.2.5
                                                                          Jan 15, 2025 19:40:08.117523909 CET49705443192.168.2.5162.159.135.232
                                                                          Jan 15, 2025 19:40:08.117563009 CET44349705162.159.135.232192.168.2.5
                                                                          Jan 15, 2025 19:40:08.165241003 CET49705443192.168.2.5162.159.135.232
                                                                          Jan 15, 2025 19:40:08.193118095 CET44349705162.159.135.232192.168.2.5
                                                                          Jan 15, 2025 19:40:08.193383932 CET44349705162.159.135.232192.168.2.5
                                                                          Jan 15, 2025 19:40:08.193500996 CET49705443192.168.2.5162.159.135.232
                                                                          Jan 15, 2025 19:40:08.195949078 CET49705443192.168.2.5162.159.135.232
                                                                          Jan 15, 2025 19:40:08.195971966 CET44349705162.159.135.232192.168.2.5
                                                                          Jan 15, 2025 19:40:08.195990086 CET49705443192.168.2.5162.159.135.232
                                                                          Jan 15, 2025 19:40:08.195997000 CET44349705162.159.135.232192.168.2.5
                                                                          Jan 15, 2025 19:40:08.204547882 CET49706443192.168.2.5162.159.133.234
                                                                          Jan 15, 2025 19:40:08.204643965 CET44349706162.159.133.234192.168.2.5
                                                                          Jan 15, 2025 19:40:08.204732895 CET49706443192.168.2.5162.159.133.234
                                                                          Jan 15, 2025 19:40:08.205127954 CET49706443192.168.2.5162.159.133.234
                                                                          Jan 15, 2025 19:40:08.205168962 CET44349706162.159.133.234192.168.2.5
                                                                          Jan 15, 2025 19:40:08.874805927 CET44349706162.159.133.234192.168.2.5
                                                                          Jan 15, 2025 19:40:08.924268961 CET49706443192.168.2.5162.159.133.234
                                                                          Jan 15, 2025 19:40:08.927189112 CET49706443192.168.2.5162.159.133.234
                                                                          Jan 15, 2025 19:40:08.927215099 CET44349706162.159.133.234192.168.2.5
                                                                          Jan 15, 2025 19:40:08.927349091 CET49706443192.168.2.5162.159.133.234
                                                                          Jan 15, 2025 19:40:08.927362919 CET44349706162.159.133.234192.168.2.5
                                                                          Jan 15, 2025 19:40:08.931147099 CET44349706162.159.133.234192.168.2.5
                                                                          Jan 15, 2025 19:40:08.931238890 CET49706443192.168.2.5162.159.133.234
                                                                          Jan 15, 2025 19:40:08.936912060 CET49706443192.168.2.5162.159.133.234
                                                                          Jan 15, 2025 19:40:08.937004089 CET49706443192.168.2.5162.159.133.234
                                                                          Jan 15, 2025 19:40:08.937119007 CET44349706162.159.133.234192.168.2.5
                                                                          Jan 15, 2025 19:40:08.984575033 CET49706443192.168.2.5162.159.133.234
                                                                          Jan 15, 2025 19:40:08.984595060 CET44349706162.159.133.234192.168.2.5
                                                                          Jan 15, 2025 19:40:09.036818981 CET49706443192.168.2.5162.159.133.234
                                                                          Jan 15, 2025 19:40:10.075258017 CET44349706162.159.133.234192.168.2.5
                                                                          Jan 15, 2025 19:40:10.075462103 CET44349706162.159.133.234192.168.2.5
                                                                          Jan 15, 2025 19:40:10.075706005 CET49706443192.168.2.5162.159.133.234
                                                                          Jan 15, 2025 19:40:10.076314926 CET49706443192.168.2.5162.159.133.234
                                                                          Jan 15, 2025 19:40:10.076314926 CET49706443192.168.2.5162.159.133.234
                                                                          Jan 15, 2025 19:40:10.076385975 CET44349706162.159.133.234192.168.2.5
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Jan 15, 2025 19:40:07.292630911 CET4999453192.168.2.51.1.1.1
                                                                          Jan 15, 2025 19:40:07.299997091 CET53499941.1.1.1192.168.2.5
                                                                          Jan 15, 2025 19:40:08.196983099 CET5552353192.168.2.51.1.1.1
                                                                          Jan 15, 2025 19:40:08.203727007 CET53555231.1.1.1192.168.2.5
                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                          Jan 15, 2025 19:40:07.292630911 CET192.168.2.51.1.1.10x2365Standard query (0)discord.comA (IP address)IN (0x0001)false
                                                                          Jan 15, 2025 19:40:08.196983099 CET192.168.2.51.1.1.10x2568Standard query (0)gateway.discord.ggA (IP address)IN (0x0001)false
                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                          Jan 15, 2025 19:40:07.299997091 CET1.1.1.1192.168.2.50x2365No error (0)discord.com162.159.135.232A (IP address)IN (0x0001)false
                                                                          Jan 15, 2025 19:40:07.299997091 CET1.1.1.1192.168.2.50x2365No error (0)discord.com162.159.138.232A (IP address)IN (0x0001)false
                                                                          Jan 15, 2025 19:40:07.299997091 CET1.1.1.1192.168.2.50x2365No error (0)discord.com162.159.137.232A (IP address)IN (0x0001)false
                                                                          Jan 15, 2025 19:40:07.299997091 CET1.1.1.1192.168.2.50x2365No error (0)discord.com162.159.136.232A (IP address)IN (0x0001)false
                                                                          Jan 15, 2025 19:40:07.299997091 CET1.1.1.1192.168.2.50x2365No error (0)discord.com162.159.128.233A (IP address)IN (0x0001)false
                                                                          Jan 15, 2025 19:40:08.203727007 CET1.1.1.1192.168.2.50x2568No error (0)gateway.discord.gg162.159.133.234A (IP address)IN (0x0001)false
                                                                          Jan 15, 2025 19:40:08.203727007 CET1.1.1.1192.168.2.50x2568No error (0)gateway.discord.gg162.159.134.234A (IP address)IN (0x0001)false
                                                                          Jan 15, 2025 19:40:08.203727007 CET1.1.1.1192.168.2.50x2568No error (0)gateway.discord.gg162.159.136.234A (IP address)IN (0x0001)false
                                                                          Jan 15, 2025 19:40:08.203727007 CET1.1.1.1192.168.2.50x2568No error (0)gateway.discord.gg162.159.130.234A (IP address)IN (0x0001)false
                                                                          Jan 15, 2025 19:40:08.203727007 CET1.1.1.1192.168.2.50x2568No error (0)gateway.discord.gg162.159.135.234A (IP address)IN (0x0001)false
                                                                          • discord.com
                                                                          • gateway.discord.gg
                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          0192.168.2.549705162.159.135.2324431440C:\Users\user\Desktop\main.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2025-01-15 18:40:08 UTC240OUTGET /api/v9/gateway HTTP/1.1
                                                                          Host: discord.com
                                                                          User-Agent: DiscordBot (https://github.com/bwmarrin/discordgo, v0.28.1)
                                                                          Authorization: Bot MTMyOTE1MzA2MjAzNTUyNTczNQ.GBlPSk.65ejGNMtJ75aP7ZZJhBWYoPIN-p7uvw3vy95eg
                                                                          Accept-Encoding: gzip
                                                                          2025-01-15 18:40:08 UTC1335INHTTP/1.1 200 OK
                                                                          Date: Wed, 15 Jan 2025 18:40:08 GMT
                                                                          Content-Type: application/json
                                                                          Content-Length: 35
                                                                          Connection: close
                                                                          Cache-Control: public, max-age=86400, s-maxage=86400
                                                                          strict-transport-security: max-age=31536000; includeSubDomains; preload
                                                                          x-ratelimit-bucket: 0a6d458104b103c7be293cc9b284d9ee
                                                                          x-ratelimit-limit: 100
                                                                          x-ratelimit-remaining: 99
                                                                          x-ratelimit-reset: 1736853315.570
                                                                          x-ratelimit-reset-after: 0.010
                                                                          via: 1.1 google
                                                                          alt-svc: h3=":443"; ma=86400
                                                                          Last-Modified: Tue, 14 Jan 2025 11:15:15 GMT
                                                                          CF-Cache-Status: HIT
                                                                          Age: 28884
                                                                          Accept-Ranges: bytes
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7%2FUumVw2EmZ9aTL1DdxijpcdCI%2FW9mLLZkkPdGyv6h4mv9tp51GsLp64Bel4vfikXPCrgzXbGaaVnLtvJH4TOtKU6P6FWVd1ljL49hN3P31YlBKZsrn7bHdFbfcc"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          X-Content-Type-Options: nosniff
                                                                          Set-Cookie: __cfruid=3e60089abf7f362edc01be899b962ca71e1b93a6-1736966408; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
                                                                          Content-Security-Policy: frame-ancestors 'none'; default-src 'none'
                                                                          Set-Cookie: _cfuvid=a3Yvx86dRfk3nrbvf22yPBvnRVXukCPGYAMTJ9wHqIQ-1736966408144-0.0.1.1-604800000; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
                                                                          Server: cloudflare
                                                                          CF-RAY: 9027fe12cc658cad-EWR
                                                                          2025-01-15 18:40:08 UTC34INData Raw: 7b 22 75 72 6c 22 3a 22 77 73 73 3a 2f 2f 67 61 74 65 77 61 79 2e 64 69 73 63 6f 72 64 2e 67 67 22 7d
                                                                          Data Ascii: {"url":"wss://gateway.discord.gg"}
                                                                          2025-01-15 18:40:08 UTC1INData Raw: 0a
                                                                          Data Ascii:


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          1192.168.2.549706162.159.133.2344431440C:\Users\user\Desktop\main.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2025-01-15 18:40:08 UTC230OUTGET /?v=9&encoding=json HTTP/1.1
                                                                          Host: gateway.discord.gg
                                                                          User-Agent: Go-http-client/1.1
                                                                          Accept-Encoding: zlib
                                                                          Connection: Upgrade
                                                                          Sec-WebSocket-Key: yQz05quw2GMcxQzzDAEY8A==
                                                                          Sec-WebSocket-Version: 13
                                                                          Upgrade: websocket
                                                                          2025-01-15 18:40:10 UTC616INHTTP/1.1 404 Not Found
                                                                          Date: Wed, 15 Jan 2025 18:40:09 GMT
                                                                          Content-Length: 0
                                                                          Connection: close
                                                                          CF-Cache-Status: DYNAMIC
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=jfkNzBRdOklNWds8y1fIiErYOgpkrV4Z8bLdMxzu91q0YVqOH%2Fnp6ULXAsmAOtgqPt3UMsrOPECRaJDDAO42j%2FhCypXmwlMgaSI8Nz37ubcn5v0r1xZY%2BW6t7dVxOAU%2FPNEaIg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                          X-Content-Type-Options: nosniff
                                                                          Server: cloudflare
                                                                          CF-RAY: 9027fe182dca32ca-EWR


                                                                          Click to jump to process

                                                                          Click to jump to process

                                                                          Click to dive into process behavior distribution

                                                                          Click to jump to process

                                                                          Target ID:0
                                                                          Start time:13:40:06
                                                                          Start date:15/01/2025
                                                                          Path:C:\Users\user\Desktop\main.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:"C:\Users\user\Desktop\main.exe"
                                                                          Imagebase:0x380000
                                                                          File size:9'889'280 bytes
                                                                          MD5 hash:95FB45D8FF76D0401499E4938AEFF5E3
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:low
                                                                          Has exited:true

                                                                          Target ID:1
                                                                          Start time:13:40:06
                                                                          Start date:15/01/2025
                                                                          Path:C:\Windows\System32\conhost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                          Imagebase:0x7ff6d64d0000
                                                                          File size:862'208 bytes
                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Reset < >
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2119125637.0000000000381000.00000020.00000001.01000000.00000003.sdmp, Offset: 00380000, based on PE: true
                                                                            • Associated: 00000000.00000002.2119104733.0000000000380000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119335443.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119547002.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119562714.000000000098A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119577207.000000000098B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119592608.000000000098C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119607018.000000000098D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119621595.000000000098E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119636268.0000000000990000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119650528.0000000000991000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119674980.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119690024.00000000009BD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119705465.00000000009BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119722176.00000000009CC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119736866.00000000009CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119751037.00000000009D1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119764855.00000000009D2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119764855.00000000009D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119764855.00000000009EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119764855.00000000009F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119764855.0000000000A1C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119843888.0000000000A23000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119843888.0000000000AD6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2120031525.0000000000CB7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2120046277.0000000000CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_380000_main.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: cff9fe2135e67e95bb574443de1d06a8e0b8e89167aa2be6e3a61b8e8eda4513
                                                                            • Instruction ID: c4e77c9cdf5ba2f31a4818e10891c9bc2cae48b8a13997d74e311ccd12539ca1
                                                                            • Opcode Fuzzy Hash: cff9fe2135e67e95bb574443de1d06a8e0b8e89167aa2be6e3a61b8e8eda4513
                                                                            • Instruction Fuzzy Hash: 5131792791CFC482D3219B24F5413ABB364F7A9794F15A715EFC812A1ADB38E2E5CB40
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2119125637.0000000000381000.00000020.00000001.01000000.00000003.sdmp, Offset: 00380000, based on PE: true
                                                                            • Associated: 00000000.00000002.2119104733.0000000000380000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119335443.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119547002.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119562714.000000000098A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119577207.000000000098B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119592608.000000000098C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119607018.000000000098D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119621595.000000000098E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119636268.0000000000990000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119650528.0000000000991000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119674980.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119690024.00000000009BD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119705465.00000000009BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119722176.00000000009CC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119736866.00000000009CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119751037.00000000009D1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119764855.00000000009D2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119764855.00000000009D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119764855.00000000009EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119764855.00000000009F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119764855.0000000000A1C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119843888.0000000000A23000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2119843888.0000000000AD6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2120031525.0000000000CB7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2120046277.0000000000CB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_380000_main.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 6e2dc365eeaf7d755159d019c6b8806dfc90132728faab9ca90f57871b6c792b
                                                                            • Instruction ID: be31ff353c0b65a0a67c134a03df427bbe6d7d8a47c1fabead39a84a699afe95
                                                                            • Opcode Fuzzy Hash: 6e2dc365eeaf7d755159d019c6b8806dfc90132728faab9ca90f57871b6c792b
                                                                            • Instruction Fuzzy Hash: