top title background image
flash

Discord nitro code generator _ checker.exe

Status: finished
Submission Time: 2020-10-28 14:25:07 +01:00
Malicious
Trojan
Spyware
Evader
HawkEye MailPassView

Comments

Tags

Details

  • Analysis ID:
    306635
  • API (Web) ID:
    515059
  • Analysis Started:
    2020-10-28 14:25:21 +01:00
  • Analysis Finished:
    2020-10-28 14:40:13 +01:00
  • MD5:
    fee052250644ec0560cf7d1738c903a8
  • SHA1:
    021308c7f566c0199307b959def81835976e387d
  • SHA256:
    4c115789d234f7bf1f8aca8821eaa599db901371bc15b04305fafa473878e45f
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 44/71
malicious
Score: 14/39
malicious
Score: 22/29
malicious

Domains

Name IP Detection
3.246.11.0.in-addr.arpa
0.0.0.0
cdn.onenote.net
0.0.0.0

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\57a6d785a.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\Shit.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\WindowsUpdate.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 10 hidden entries
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_57a6d785a.exe_3b983a5c61eeb5d3956af1dbef64803503e53_50cfd662_162a8438\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER12C2.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER18CE.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERECDA.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Oct 28 21:26:55 2020, 0x1205a4 type
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\57a6d785a.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Discord nitro code generator _ checker.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Shit.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\WindowsUpdate.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\pid.txt
ASCII text, with no line terminators
#
C:\Users\user\AppData\Roaming\pidloc.txt
ASCII text, with no line terminators
#