Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
fg}.exe

Overview

General Information

Sample name:fg}.exe
Analysis ID:1465717
MD5:e9a886374becfb0a5b1dc0ffcee1a04a
SHA1:c692a6e9437299878b43ea5fa8ee1be0e1f5c782
SHA256:7e694dfc8060bbbaf8c4139f974696d5fc3be48bd9d9d46eb166f55f7c024fb2
Tags:exe
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for dropped file
Machine Learning detection for sample
Protects its processes via BreakOnTermination flag
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • fg}.exe (PID: 7540 cmdline: "C:\Users\user\Desktop\fg}.exe" MD5: E9A886374BECFB0A5B1DC0FFCEE1A04A)
  • cleanup
{"C2 url": ["people-climbing.gl.at.ply.gg"], "Port": "54251", "Aes key": "90734242", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.2"}
SourceRuleDescriptionAuthorStrings
fg}.exeJoeSecurity_XWormYara detected XWormJoe Security
    fg}.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0xce04:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0xcea1:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0xcfb6:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0xc93b:$cnc4: POST / HTTP/1.1
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\XClient.exeJoeSecurity_XWormYara detected XWormJoe Security
      C:\Users\user\AppData\Roaming\XClient.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0xce04:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0xcea1:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0xcfb6:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0xc93b:$cnc4: POST / HTTP/1.1
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.1314086519.00000000004D2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_XWormYara detected XWormJoe Security
        00000000.00000000.1314086519.00000000004D2000.00000002.00000001.01000000.00000003.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
        • 0xcc04:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
        • 0xcca1:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
        • 0xcdb6:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
        • 0xc73b:$cnc4: POST / HTTP/1.1
        Process Memory Space: fg}.exe PID: 7540JoeSecurity_XWormYara detected XWormJoe Security
          SourceRuleDescriptionAuthorStrings
          0.0.fg}.exe.4d0000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
            0.0.fg}.exe.4d0000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0xce04:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0xcea1:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0xcfb6:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0xc93b:$cnc4: POST / HTTP/1.1

            System Summary

            barindex
            Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\Desktop\fg}.exe, ProcessId: 7540, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: fg}.exeAvira: detected
            Source: people-climbing.gl.at.ply.ggAvira URL Cloud: Label: malware
            Source: C:\Users\user\AppData\Roaming\XClient.exeAvira: detection malicious, Label: HEUR/AGEN.1305769
            Source: fg}.exeMalware Configuration Extractor: Xworm {"C2 url": ["people-climbing.gl.at.ply.gg"], "Port": "54251", "Aes key": "90734242", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.2"}
            Source: C:\Users\user\AppData\Roaming\XClient.exeReversingLabs: Detection: 71%
            Source: fg}.exeReversingLabs: Detection: 71%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Roaming\XClient.exeJoe Sandbox ML: detected
            Source: fg}.exeJoe Sandbox ML: detected
            Source: fg}.exeString decryptor: people-climbing.gl.at.ply.gg
            Source: fg}.exeString decryptor: 54251
            Source: fg}.exeString decryptor: 90734242
            Source: fg}.exeString decryptor: <Xwormmm>
            Source: fg}.exeString decryptor: XWorm V5.2
            Source: fg}.exeString decryptor: USB.exe
            Source: fg}.exeString decryptor: %AppData%
            Source: fg}.exeString decryptor: XClient.exe
            Source: fg}.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: fg}.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: Malware configuration extractorURLs: people-climbing.gl.at.ply.gg
            Source: global trafficTCP traffic: 192.168.2.9:49706 -> 147.185.221.20:54251
            Source: Joe Sandbox ViewIP Address: 147.185.221.20 147.185.221.20
            Source: Joe Sandbox ViewASN Name: SALSGIVERUS SALSGIVERUS
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficDNS traffic detected: DNS query: people-climbing.gl.at.ply.gg
            Source: fg}.exe, 00000000.00000002.3778806031.00000000029F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

            Operating System Destruction

            barindex
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: 01 00 00 00 Jump to behavior

            System Summary

            barindex
            Source: fg}.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 0.0.fg}.exe.4d0000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000000.00000000.1314086519.00000000004D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: C:\Users\user\AppData\Roaming\XClient.exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: C:\Users\user\Desktop\fg}.exeCode function: 0_2_00007FF886E273A60_2_00007FF886E273A6
            Source: C:\Users\user\Desktop\fg}.exeCode function: 0_2_00007FF886E211680_2_00007FF886E21168
            Source: C:\Users\user\Desktop\fg}.exeCode function: 0_2_00007FF886E281520_2_00007FF886E28152
            Source: C:\Users\user\Desktop\fg}.exeCode function: 0_2_00007FF886E20E2D0_2_00007FF886E20E2D
            Source: fg}.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: fg}.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 0.0.fg}.exe.4d0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000000.00000000.1314086519.00000000004D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: C:\Users\user\AppData\Roaming\XClient.exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: fg}.exe, lZz16auSsASjwTFg.csCryptographic APIs: 'TransformFinalBlock'
            Source: fg}.exe, EUpXc4FBNK70VCAV.csCryptographic APIs: 'TransformFinalBlock'
            Source: fg}.exe, EUpXc4FBNK70VCAV.csCryptographic APIs: 'TransformFinalBlock'
            Source: XClient.exe.0.dr, lZz16auSsASjwTFg.csCryptographic APIs: 'TransformFinalBlock'
            Source: XClient.exe.0.dr, EUpXc4FBNK70VCAV.csCryptographic APIs: 'TransformFinalBlock'
            Source: XClient.exe.0.dr, EUpXc4FBNK70VCAV.csCryptographic APIs: 'TransformFinalBlock'
            Source: fg}.exe, kKP4mhaiB40j0WJyk55Hty3KpaIHMj.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: fg}.exe, kKP4mhaiB40j0WJyk55Hty3KpaIHMj.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: XClient.exe.0.dr, kKP4mhaiB40j0WJyk55Hty3KpaIHMj.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: XClient.exe.0.dr, kKP4mhaiB40j0WJyk55Hty3KpaIHMj.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: classification engineClassification label: mal100.troj.evad.winEXE@1/2@1/1
            Source: C:\Users\user\Desktop\fg}.exeFile created: C:\Users\user\AppData\Roaming\XClient.exeJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeMutant created: NULL
            Source: C:\Users\user\Desktop\fg}.exeMutant created: \Sessions\1\BaseNamedObjects\U3NiITrpodUSuXtA
            Source: fg}.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: fg}.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
            Source: C:\Users\user\Desktop\fg}.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: fg}.exeReversingLabs: Detection: 71%
            Source: C:\Users\user\Desktop\fg}.exeFile read: C:\Users\user\Desktop\fg}.exeJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: scrrun.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: linkinfo.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: ntshrui.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: cscapi.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: avicap32.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: msvfw32.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\InProcServer32Jump to behavior
            Source: XClient.lnk.0.drLNK file: ..\..\..\..\..\XClient.exe
            Source: fg}.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: fg}.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: fg}.exe, Mh6pKaIqYgtBe5OQhobwC9hwd9Jv8x.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{_22JSrHb70IyjmjkQwaFdAAQ8umAk3gzviAF3bg60F4GSApoWpWa9Cd2EZIfuPyujxRaseQmqA00G2uDGPMD4GruG.nMEbUPDap95wy0tD8G3QrrJloRUwbW84rut2Z5z3ntZYcf1j1UMIUHirThSVoS9JyTnhWAyKXE4O0NVGGnNPFC81,_22JSrHb70IyjmjkQwaFdAAQ8umAk3gzviAF3bg60F4GSApoWpWa9Cd2EZIfuPyujxRaseQmqA00G2uDGPMD4GruG.Tbb8DvPKSl0W6nuy6DAnsFvy2sLkkWnuAhU8hRKAwLQFJAVPrLUpiakqKYDJMWpPeYOe8q5rkq3dI1uYF8pbazrj,_22JSrHb70IyjmjkQwaFdAAQ8umAk3gzviAF3bg60F4GSApoWpWa9Cd2EZIfuPyujxRaseQmqA00G2uDGPMD4GruG.TNy0J82033vcFgs2bxsQ6OvPaPewgKOXcB89qXImEPx2ablhRct5aydB7QOcOYni1cf5bd4rcEo635tlKHC80aKI,_22JSrHb70IyjmjkQwaFdAAQ8umAk3gzviAF3bg60F4GSApoWpWa9Cd2EZIfuPyujxRaseQmqA00G2uDGPMD4GruG._7L9qZtgXJHqGXmKaVPAfJ0VrtBZYNCmIsa5T6sNfSGMXLn1CJ65HSPz5bgd4ba6oFgpQxPsZHjbfKSbnLaMxSRkf,EUpXc4FBNK70VCAV.SsM4HaS3mxdXVuvi()}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: fg}.exe, Mh6pKaIqYgtBe5OQhobwC9hwd9Jv8x.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{fsmI8eEC06QTzO0u[2],EUpXc4FBNK70VCAV.S52Z16hS3e7QaWtV(Convert.FromBase64String(fsmI8eEC06QTzO0u[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: fg}.exe, Mh6pKaIqYgtBe5OQhobwC9hwd9Jv8x.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[1] { fsmI8eEC06QTzO0u[2] }}, (string[])null, (Type[])null, (bool[])null, true)
            Source: XClient.exe.0.dr, Mh6pKaIqYgtBe5OQhobwC9hwd9Jv8x.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{_22JSrHb70IyjmjkQwaFdAAQ8umAk3gzviAF3bg60F4GSApoWpWa9Cd2EZIfuPyujxRaseQmqA00G2uDGPMD4GruG.nMEbUPDap95wy0tD8G3QrrJloRUwbW84rut2Z5z3ntZYcf1j1UMIUHirThSVoS9JyTnhWAyKXE4O0NVGGnNPFC81,_22JSrHb70IyjmjkQwaFdAAQ8umAk3gzviAF3bg60F4GSApoWpWa9Cd2EZIfuPyujxRaseQmqA00G2uDGPMD4GruG.Tbb8DvPKSl0W6nuy6DAnsFvy2sLkkWnuAhU8hRKAwLQFJAVPrLUpiakqKYDJMWpPeYOe8q5rkq3dI1uYF8pbazrj,_22JSrHb70IyjmjkQwaFdAAQ8umAk3gzviAF3bg60F4GSApoWpWa9Cd2EZIfuPyujxRaseQmqA00G2uDGPMD4GruG.TNy0J82033vcFgs2bxsQ6OvPaPewgKOXcB89qXImEPx2ablhRct5aydB7QOcOYni1cf5bd4rcEo635tlKHC80aKI,_22JSrHb70IyjmjkQwaFdAAQ8umAk3gzviAF3bg60F4GSApoWpWa9Cd2EZIfuPyujxRaseQmqA00G2uDGPMD4GruG._7L9qZtgXJHqGXmKaVPAfJ0VrtBZYNCmIsa5T6sNfSGMXLn1CJ65HSPz5bgd4ba6oFgpQxPsZHjbfKSbnLaMxSRkf,EUpXc4FBNK70VCAV.SsM4HaS3mxdXVuvi()}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: XClient.exe.0.dr, Mh6pKaIqYgtBe5OQhobwC9hwd9Jv8x.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{fsmI8eEC06QTzO0u[2],EUpXc4FBNK70VCAV.S52Z16hS3e7QaWtV(Convert.FromBase64String(fsmI8eEC06QTzO0u[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: XClient.exe.0.dr, Mh6pKaIqYgtBe5OQhobwC9hwd9Jv8x.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[1] { fsmI8eEC06QTzO0u[2] }}, (string[])null, (Type[])null, (bool[])null, true)
            Source: fg}.exe, Mh6pKaIqYgtBe5OQhobwC9hwd9Jv8x.cs.Net Code: TMxdjZlV6A3c8E5kT4gZnzVnxlsBqT System.AppDomain.Load(byte[])
            Source: fg}.exe, Mh6pKaIqYgtBe5OQhobwC9hwd9Jv8x.cs.Net Code: qRlclbJIAjME5rxC System.AppDomain.Load(byte[])
            Source: fg}.exe, Mh6pKaIqYgtBe5OQhobwC9hwd9Jv8x.cs.Net Code: qRlclbJIAjME5rxC
            Source: XClient.exe.0.dr, Mh6pKaIqYgtBe5OQhobwC9hwd9Jv8x.cs.Net Code: TMxdjZlV6A3c8E5kT4gZnzVnxlsBqT System.AppDomain.Load(byte[])
            Source: XClient.exe.0.dr, Mh6pKaIqYgtBe5OQhobwC9hwd9Jv8x.cs.Net Code: qRlclbJIAjME5rxC System.AppDomain.Load(byte[])
            Source: XClient.exe.0.dr, Mh6pKaIqYgtBe5OQhobwC9hwd9Jv8x.cs.Net Code: qRlclbJIAjME5rxC
            Source: fg}.exe, 22JSrHb70IyjmjkQwaFdAAQ8umAk3gzviAF3bg60F4GSApoWpWa9Cd2EZIfuPyujxRaseQmqA00G2uDGPMD4GruG.csHigh entropy of concatenated method names: 'VYpVGDWSAOe6hGubN8jike3gxLeeu9LaQ2G23XigKCwNlihEE5Pod', 'WP7Qw82qutWFuS8E8YGsgUNMTf3osQADq31co6NAMQXo9yES2aSEK', 'oUCjC2uqO8QBu8RgZ9GbVqBSBRq6jbvPUkgExeCuWur5XGHinnLMP', 'eUZQ1nMBI9TF4iYb4io4oBk5wQl9q6035SBXG0r6p9UdbwEnCJS0o'
            Source: fg}.exe, rd1bhuRAKvlsbm7m.csHigh entropy of concatenated method names: 'QHS5U8dWqQD1x6V1', 'BFdz5pWi7ZenaEOA', 'Ol7nGZfDr3hMk5GK', 'lQ1cm8pMTiy5z', 'HiIorPCy5FL62', 'VybHHEQcEZJsz', 'dgV45OfYJJnKP', 'KDg2LphpdE4TK', 'SRAjggBKdY4AL', 'ix66QvrGJk8d7'
            Source: fg}.exe, q8dlgS785uD2Q.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'LLz4pj5zt0DtvvHmrAEXneSjfX9ZcnfPyxsXQGy92PQbaaaOPjDJ4', 'NaJAOowLOndXiuv7fCH0dAmV5Kr9t13lf4aed4zwaFSWR8Js571ko', 'PbTsjYGRyzhNDPUJi20QKBQidM3whPOK8gpmSG10hkVdtWLVxwx2X', 'N2QOjYZ80Yi7RcpPrf5MsXbsVQfvFz6vw3Lm642zfDgtPK7clyEJa'
            Source: fg}.exe, kKP4mhaiB40j0WJyk55Hty3KpaIHMj.csHigh entropy of concatenated method names: '_2XlQ068DxNno4SwIVnNSkTcVUA8S1z', 'i06Rc2x8K5e7hAymiZXwlzwTbB5Rw6', 'Ah4JehHa6fY7Ef3fmBSyIa4kt6Hjox', 'gDN1k4XJTMrxAEh6mHEnvrzbG27iXl', 'cbpzoL2Bdn1YU8aoYgU41mBaLRpTYq', '_8BsSIIX8BDBnDHyIMnfUwykWXhEIE3', 'ODhWklo0CnUCA1VevT0gqEgnJ9xyI3', 'K9eKXo6NvVNvKchMbsN9MfmfkbTp8e', '_2yQr8kL4iBf09TcCv6uJ5BME9RXli9', 'uNBBahDpjUAuFo1wNhqUA5utpp2cgu'
            Source: fg}.exe, EtrArFBKiAHGxPz1.csHigh entropy of concatenated method names: 'T74c1AnWCbiA2t8y', 'e6LhvvnOVI08rRm2R6rQaBvcmLuN5aQHVzuvwtFhKCOqxE8mbNEHnQvMzFkhchjIYgmHgA', '_8IOWKuWVIdaeVy8cHx5XBqXDqG3Pxmu1fL1bzfRLEeHJtmSIx7Iufvl7WEzq7v0aZ2JvEe', 'XW8ZVmGVYtkundDKXYfQiuJpL2pKBFPaIl16ShOR16qTWf56giqByxh05poIuAU2xQCFQZ', 'eOd2yR200fg6GMEk6TKlEHMDTCqF1sWJUlTQlAplOeMg6OgETkfreYRQssoXRVKPGUblAB'
            Source: fg}.exe, x796DvNGKZNtNfCKciEBF83GKKh7zn.csHigh entropy of concatenated method names: 'idMhS0aU0oZm8dxRmk716XdTaharWk', 'MPu2dk1y77ncRTW7uOY8mlhtLgfXEF', 'ePSSaXXpBSdoEsH48Kp98e7ZOsLYrF', 'fYQFKaUa2elnCn0DqQ8MG2f6MJj7cMlj7s39GdUj3oejp0fbIhg91', 'CLVuuLz4UzcL1wWuSLnPpp86JUKJuEWC1gzYIG0UPGyF7cAbfqeJS', '_54vDnPhVZt7koS9G8bej34GF1cik23nsGkLsip1XKc9bG9tN1H3Ux', 'gvwPtL0RThGdmtZeKa1dJf79CvwshY8j7RDkIssAslQPkb0IplOoD', '_44T6FtJfoG73LwCe0unSh5N5SOmDCpBSYc5lJidnqFIXqpZYeCY8g', 'ZJowQS3dvs4UbQ1lhvJL0mPkujtVT5yzVpWoHbcYTbgYeFx8l7vhX', 'gzil4pkwp89xZAjCFqyY8tkg2quv32HxuXYPtX23rCzo1guzfeutm'
            Source: fg}.exe, Mh6pKaIqYgtBe5OQhobwC9hwd9Jv8x.csHigh entropy of concatenated method names: 'inPzDvTlMzfqmc1UMQNl6jAOyEaMei', 'TMxdjZlV6A3c8E5kT4gZnzVnxlsBqT', 'IQ9SMEqbs4i3FxF8dqH2UpgUzISH8P', 'dWGDDgPuqQLvumdThjlHpYkXDrkWGQ', '_7ciVgin3ST1tcwkNTB7pTiy4eiu6xk', 'MbswDvNMxpjI61S2QF1cDNPlZu8EtD', 'FjIGET6Nlffcqs5OgLL1EBQLmaLYiG', 'M8pXWdo4tK8pdYuZ8QYnfDBOonuYl4', 'RLnC87NJn4huG750OBOI06RO0vRjX0', '_16XJrehhRxGdaili'
            Source: fg}.exe, xt1OJQtnZDKHEPNK.csHigh entropy of concatenated method names: '_7lZNRGwroJ4qslNC', 'zcK9B8WPi5nPvQL3', '_7yWUk31HZEqy56io', 'MB3kJjh8n6S8wjyc', '_9Q5gfsYcbP6BSizV7g0BGxdEE0zY5vijNEACLwOtYoarPARYvcpWoMXd17jfJUe7Da3akb', '_56QDWxbLIHhceei8K67lvggY5d23L7lTPPBRrf9yJ7th8hKsXp7g4qm4HrAEFwYteBkW1b', 'm03NTAK0haWqjUELKBRADocsdzBum1kfiaQDSTHJdQlRaQZCM90X330I42gw5RMONHGRd2', 'isNGB5rBZoQRX2PiRk9Md2PqGjeq1bIB6qg2Ed4sF1TyuHUqtwftjrf0vyAlDJPiKNxi31', 'jsmm7Evxbheax', 'dcHMiJUOfGv3K'
            Source: fg}.exe, EUpXc4FBNK70VCAV.csHigh entropy of concatenated method names: '_5B1lb0INkn036PCS', '_5cHJEKe5KOFKsz15', 'FEbiqXrMgsxi3ecw', '_9HrIZrbMbBTI38Ea', 'CsZgJhYiBtfsNUlB', '_5thQRYKEXPu8nJJk', 's2n2QkhjGyAe3OpO', 'NWRuaUOogKQrFFFo', '_3MS2hGmnaHyZy12H', 'wv4ixeNFMThEenLL'
            Source: XClient.exe.0.dr, 22JSrHb70IyjmjkQwaFdAAQ8umAk3gzviAF3bg60F4GSApoWpWa9Cd2EZIfuPyujxRaseQmqA00G2uDGPMD4GruG.csHigh entropy of concatenated method names: 'VYpVGDWSAOe6hGubN8jike3gxLeeu9LaQ2G23XigKCwNlihEE5Pod', 'WP7Qw82qutWFuS8E8YGsgUNMTf3osQADq31co6NAMQXo9yES2aSEK', 'oUCjC2uqO8QBu8RgZ9GbVqBSBRq6jbvPUkgExeCuWur5XGHinnLMP', 'eUZQ1nMBI9TF4iYb4io4oBk5wQl9q6035SBXG0r6p9UdbwEnCJS0o'
            Source: XClient.exe.0.dr, rd1bhuRAKvlsbm7m.csHigh entropy of concatenated method names: 'QHS5U8dWqQD1x6V1', 'BFdz5pWi7ZenaEOA', 'Ol7nGZfDr3hMk5GK', 'lQ1cm8pMTiy5z', 'HiIorPCy5FL62', 'VybHHEQcEZJsz', 'dgV45OfYJJnKP', 'KDg2LphpdE4TK', 'SRAjggBKdY4AL', 'ix66QvrGJk8d7'
            Source: XClient.exe.0.dr, q8dlgS785uD2Q.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'LLz4pj5zt0DtvvHmrAEXneSjfX9ZcnfPyxsXQGy92PQbaaaOPjDJ4', 'NaJAOowLOndXiuv7fCH0dAmV5Kr9t13lf4aed4zwaFSWR8Js571ko', 'PbTsjYGRyzhNDPUJi20QKBQidM3whPOK8gpmSG10hkVdtWLVxwx2X', 'N2QOjYZ80Yi7RcpPrf5MsXbsVQfvFz6vw3Lm642zfDgtPK7clyEJa'
            Source: XClient.exe.0.dr, kKP4mhaiB40j0WJyk55Hty3KpaIHMj.csHigh entropy of concatenated method names: '_2XlQ068DxNno4SwIVnNSkTcVUA8S1z', 'i06Rc2x8K5e7hAymiZXwlzwTbB5Rw6', 'Ah4JehHa6fY7Ef3fmBSyIa4kt6Hjox', 'gDN1k4XJTMrxAEh6mHEnvrzbG27iXl', 'cbpzoL2Bdn1YU8aoYgU41mBaLRpTYq', '_8BsSIIX8BDBnDHyIMnfUwykWXhEIE3', 'ODhWklo0CnUCA1VevT0gqEgnJ9xyI3', 'K9eKXo6NvVNvKchMbsN9MfmfkbTp8e', '_2yQr8kL4iBf09TcCv6uJ5BME9RXli9', 'uNBBahDpjUAuFo1wNhqUA5utpp2cgu'
            Source: XClient.exe.0.dr, EtrArFBKiAHGxPz1.csHigh entropy of concatenated method names: 'T74c1AnWCbiA2t8y', 'e6LhvvnOVI08rRm2R6rQaBvcmLuN5aQHVzuvwtFhKCOqxE8mbNEHnQvMzFkhchjIYgmHgA', '_8IOWKuWVIdaeVy8cHx5XBqXDqG3Pxmu1fL1bzfRLEeHJtmSIx7Iufvl7WEzq7v0aZ2JvEe', 'XW8ZVmGVYtkundDKXYfQiuJpL2pKBFPaIl16ShOR16qTWf56giqByxh05poIuAU2xQCFQZ', 'eOd2yR200fg6GMEk6TKlEHMDTCqF1sWJUlTQlAplOeMg6OgETkfreYRQssoXRVKPGUblAB'
            Source: XClient.exe.0.dr, x796DvNGKZNtNfCKciEBF83GKKh7zn.csHigh entropy of concatenated method names: 'idMhS0aU0oZm8dxRmk716XdTaharWk', 'MPu2dk1y77ncRTW7uOY8mlhtLgfXEF', 'ePSSaXXpBSdoEsH48Kp98e7ZOsLYrF', 'fYQFKaUa2elnCn0DqQ8MG2f6MJj7cMlj7s39GdUj3oejp0fbIhg91', 'CLVuuLz4UzcL1wWuSLnPpp86JUKJuEWC1gzYIG0UPGyF7cAbfqeJS', '_54vDnPhVZt7koS9G8bej34GF1cik23nsGkLsip1XKc9bG9tN1H3Ux', 'gvwPtL0RThGdmtZeKa1dJf79CvwshY8j7RDkIssAslQPkb0IplOoD', '_44T6FtJfoG73LwCe0unSh5N5SOmDCpBSYc5lJidnqFIXqpZYeCY8g', 'ZJowQS3dvs4UbQ1lhvJL0mPkujtVT5yzVpWoHbcYTbgYeFx8l7vhX', 'gzil4pkwp89xZAjCFqyY8tkg2quv32HxuXYPtX23rCzo1guzfeutm'
            Source: XClient.exe.0.dr, Mh6pKaIqYgtBe5OQhobwC9hwd9Jv8x.csHigh entropy of concatenated method names: 'inPzDvTlMzfqmc1UMQNl6jAOyEaMei', 'TMxdjZlV6A3c8E5kT4gZnzVnxlsBqT', 'IQ9SMEqbs4i3FxF8dqH2UpgUzISH8P', 'dWGDDgPuqQLvumdThjlHpYkXDrkWGQ', '_7ciVgin3ST1tcwkNTB7pTiy4eiu6xk', 'MbswDvNMxpjI61S2QF1cDNPlZu8EtD', 'FjIGET6Nlffcqs5OgLL1EBQLmaLYiG', 'M8pXWdo4tK8pdYuZ8QYnfDBOonuYl4', 'RLnC87NJn4huG750OBOI06RO0vRjX0', '_16XJrehhRxGdaili'
            Source: XClient.exe.0.dr, xt1OJQtnZDKHEPNK.csHigh entropy of concatenated method names: '_7lZNRGwroJ4qslNC', 'zcK9B8WPi5nPvQL3', '_7yWUk31HZEqy56io', 'MB3kJjh8n6S8wjyc', '_9Q5gfsYcbP6BSizV7g0BGxdEE0zY5vijNEACLwOtYoarPARYvcpWoMXd17jfJUe7Da3akb', '_56QDWxbLIHhceei8K67lvggY5d23L7lTPPBRrf9yJ7th8hKsXp7g4qm4HrAEFwYteBkW1b', 'm03NTAK0haWqjUELKBRADocsdzBum1kfiaQDSTHJdQlRaQZCM90X330I42gw5RMONHGRd2', 'isNGB5rBZoQRX2PiRk9Md2PqGjeq1bIB6qg2Ed4sF1TyuHUqtwftjrf0vyAlDJPiKNxi31', 'jsmm7Evxbheax', 'dcHMiJUOfGv3K'
            Source: XClient.exe.0.dr, EUpXc4FBNK70VCAV.csHigh entropy of concatenated method names: '_5B1lb0INkn036PCS', '_5cHJEKe5KOFKsz15', 'FEbiqXrMgsxi3ecw', '_9HrIZrbMbBTI38Ea', 'CsZgJhYiBtfsNUlB', '_5thQRYKEXPu8nJJk', 's2n2QkhjGyAe3OpO', 'NWRuaUOogKQrFFFo', '_3MS2hGmnaHyZy12H', 'wv4ixeNFMThEenLL'
            Source: C:\Users\user\Desktop\fg}.exeFile created: C:\Users\user\AppData\Roaming\XClient.exeJump to dropped file
            Source: C:\Users\user\Desktop\fg}.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnkJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnkJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\fg}.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\fg}.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\fg}.exeMemory allocated: A20000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeMemory allocated: 1A9F0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\fg}.exeWindow / User API: threadDelayed 8922Jump to behavior
            Source: C:\Users\user\Desktop\fg}.exeWindow / User API: threadDelayed 925Jump to behavior
            Source: C:\Users\user\Desktop\fg}.exe TID: 7704Thread sleep time: -1844674407370954s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: fg}.exe, 00000000.00000002.3780080705.000000001B880000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWtpMo%SystemRoot%\system32\mswsock.dlln=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" />
            Source: C:\Users\user\Desktop\fg}.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeMemory allocated: page read and write | page guardJump to behavior
            Source: fg}.exe, 00000000.00000002.3778806031.000000000303E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 'PING!<Xwormmm>Program Manager<Xwormmm>0
            Source: fg}.exe, 00000000.00000002.3778806031.000000000303E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: fg}.exe, 00000000.00000002.3778806031.000000000303E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: PING!<Xwormmm>Program Manager<Xwormmm>0
            Source: fg}.exe, 00000000.00000002.3778806031.000000000303E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 'PING!<Xwormmm>Program Manager<Xwormmm>0@
            Source: fg}.exe, 00000000.00000002.3778806031.000000000303E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager2
            Source: C:\Users\user\Desktop\fg}.exeQueries volume information: C:\Users\user\Desktop\fg}.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\fg}.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: fg}.exe, 00000000.00000002.3780080705.000000001B8DD000.00000004.00000020.00020000.00000000.sdmp, fg}.exe, 00000000.00000002.3780080705.000000001B880000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: C:\Users\user\Desktop\fg}.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\Desktop\fg}.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: fg}.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.fg}.exe.4d0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1314086519.00000000004D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: fg}.exe PID: 7540, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\XClient.exe, type: DROPPED

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: fg}.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.fg}.exe.4d0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1314086519.00000000004D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: fg}.exe PID: 7540, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\XClient.exe, type: DROPPED
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
            Windows Management Instrumentation
            2
            Registry Run Keys / Startup Folder
            1
            Process Injection
            1
            Masquerading
            OS Credential Dumping221
            Security Software Discovery
            Remote Services11
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/Job1
            DLL Side-Loading
            2
            Registry Run Keys / Startup Folder
            1
            Disable or Modify Tools
            LSASS Memory1
            Process Discovery
            Remote Desktop ProtocolData from Removable Media1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            131
            Virtualization/Sandbox Evasion
            Security Account Manager131
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive1
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Process Injection
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput Capture11
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets1
            File and Directory Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
            Software Packing
            Cached Domain Credentials13
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            fg}.exe71%ReversingLabsByteCode-MSIL.Backdoor.XWormRAT
            fg}.exe100%AviraHEUR/AGEN.1305769
            fg}.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\XClient.exe100%AviraHEUR/AGEN.1305769
            C:\Users\user\AppData\Roaming\XClient.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Roaming\XClient.exe71%ReversingLabsByteCode-MSIL.Backdoor.XWormRAT
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            people-climbing.gl.at.ply.gg100%Avira URL Cloudmalware
            NameIPActiveMaliciousAntivirus DetectionReputation
            people-climbing.gl.at.ply.gg
            147.185.221.20
            truetrue
              unknown
              NameMaliciousAntivirus DetectionReputation
              people-climbing.gl.at.ply.ggtrue
              • Avira URL Cloud: malware
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namefg}.exe, 00000000.00000002.3778806031.00000000029F1000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              147.185.221.20
              people-climbing.gl.at.ply.ggUnited States
              12087SALSGIVERUStrue
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1465717
              Start date and time:2024-07-02 00:31:10 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 6m 32s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:6
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:fg}.exe
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@1/2@1/1
              EGA Information:Failed
              HCA Information:
              • Successful, ratio: 98%
              • Number of executed functions: 4
              • Number of non-executed functions: 1
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240000 for current running targets taking high CPU consumption
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
              • Execution Graph export aborted for target fg}.exe, PID 7540 because it is empty
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • VT rate limit hit for: fg}.exe
              TimeTypeDescription
              18:32:16API Interceptor13656500x Sleep call for process: fg}.exe modified
              23:32:04AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              147.185.221.20build.exeGet hashmaliciousRedLineBrowse
                Ph58Rkdxor.exeGet hashmaliciousXWormBrowse
                  4kvADqDmZ4.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                    Discord Tools.exeGet hashmaliciousXWormBrowse
                      Image logger beta.exeGet hashmaliciousAsyncRAT, XWormBrowse
                        fart.exeGet hashmaliciousAsyncRAT, DcRat, Quasar, XWormBrowse
                          fart.exeGet hashmaliciousAsyncRAT, DcRat, Quasar, XWormBrowse
                            Shiba Genisis Loader.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                              ModStickInjectorV1.exeGet hashmaliciousAsyncRAT, DcRat, Quasar, XWormBrowse
                                Loader.exeGet hashmaliciousQuasarBrowse
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  people-climbing.gl.at.ply.ggbuild.exeGet hashmaliciousRedLineBrowse
                                  • 147.185.221.20
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  SALSGIVERUSbuild.exeGet hashmaliciousRedLineBrowse
                                  • 147.185.221.20
                                  bJLd0SUHfj.exeGet hashmaliciousUnknownBrowse
                                  • 147.185.221.18
                                  PGjIoaqfQY.exeGet hashmaliciousUnknownBrowse
                                  • 147.185.221.18
                                  V6363OW8Rh.exeGet hashmaliciousXWormBrowse
                                  • 147.185.221.18
                                  x6221haMsm.exeGet hashmaliciousUnknownBrowse
                                  • 147.185.221.18
                                  Ph58Rkdxor.exeGet hashmaliciousXWormBrowse
                                  • 147.185.221.20
                                  4kvADqDmZ4.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                  • 147.185.221.20
                                  BviOG97ArX.elfGet hashmaliciousMirai, MoobotBrowse
                                  • 147.176.119.108
                                  a.exeGet hashmaliciousUnknownBrowse
                                  • 147.185.221.18
                                  hatabat.exeGet hashmaliciousBlank Grabber, DCRat, XWormBrowse
                                  • 147.185.221.17
                                  No context
                                  No context
                                  Process:C:\Users\user\Desktop\fg}.exe
                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Jul 1 21:32:03 2024, mtime=Mon Jul 1 21:32:03 2024, atime=Mon Jul 1 21:32:03 2024, length=59392, window=hide
                                  Category:dropped
                                  Size (bytes):763
                                  Entropy (8bit):5.044858479027047
                                  Encrypted:false
                                  SSDEEP:12:8S24o6idtChToyedY//pFTr4X7SLcFXXjAXVwNHkMp5mV:8EO8oyZfEX4cFXzAXVwCMp5m
                                  MD5:97A12910391572B661EB114ECEC6F126
                                  SHA1:FDCED288806CF8BF247983F75FCC583D85F00BDF
                                  SHA-256:3848F0A8FF68EA6605992B9726398902BB393148346AD2C245D37BA2A129F4D2
                                  SHA-512:11B34F8B7AABC0603D42D76B55C60038DC5441EAF42BAEFDD101107D66E637BA5F854662444BEF463133418F586F838D8F5E4FFDF4B4F516E799C43A3733DFC8
                                  Malicious:false
                                  Reputation:low
                                  Preview:L..................F.... ...X..~.....X.~.....X.~............................v.:..DG..Yr?.D..U..k0.&...&.......bBDj...\J.w.....V.~........t...CFSF..1.....EWsG..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EWsG.X............................=...A.p.p.D.a.t.a...B.V.1......X....Roaming.@......EWsG.X............................K...R.o.a.m.i.n.g.....b.2......X.. .XClient.exe.H.......X...X......^.....................5..X.C.l.i.e.n.t...e.x.e.......X...............-.......W...........T[&......C:\Users\user\AppData\Roaming\XClient.exe........\.....\.....\.....\.....\.X.C.l.i.e.n.t...e.x.e.`.......X.......571345...........hT..CrF.f4... ...E._c...,...E...hT..CrF.f4... ...E._c...,...E..E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                  Process:C:\Users\user\Desktop\fg}.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):59392
                                  Entropy (8bit):5.897811546999433
                                  Encrypted:false
                                  SSDEEP:1536:R3iKaQ7P66xgWbXPIT+VvVkby0A4OiUheAImOF+V3:fPFN0Tg9kby0siA/ROF+V3
                                  MD5:E9A886374BECFB0A5B1DC0FFCEE1A04A
                                  SHA1:C692A6E9437299878B43EA5FA8EE1BE0E1F5C782
                                  SHA-256:7E694DFC8060BBBAF8C4139F974696D5FC3BE48BD9D9D46EB166F55F7C024FB2
                                  SHA-512:BC9E0AFFC52EA052EEBF1D4B2AFF0E89BEC9B4780F14914EF14E27BB44A83E266791555FD79B5C1117953B37FE4623B2F6AFEFFB4F281A0D94E9A4261B882284
                                  Malicious:true
                                  Yara Hits:
                                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Roaming\XClient.exe, Author: Joe Security
                                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Roaming\XClient.exe, Author: ditekSHen
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 71%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...H..f............................>.... ........@.. .......................@............@.....................................K............................ ....................................................... ............... ..H............text...D.... ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B................ .......H.......TW..........&.....................................................(....*.r...p*. .B..*..(....*.r#..p*. i...*.s.........s.........s.........s.........*.r...p*. .[..*.r...p*. &...*.rg..p*. .x!.*.r...p*. ....*.r?..p*. )...*..((...*.r...p*. ....*.r...p*. .Kl.*&(....&+.*.+5sH... .... .'..oI...(*...~....-.(A...(3...~....oJ...&.-.*.r...p*. .#..*.rU..p*. .#;.*.r...p*.r-..p*. ....*..............j..................sK..............~.........*"(C...+.*:.t....(>...+.*.r...p*. ..G.
                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):5.897811546999433
                                  TrID:
                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                  • Win32 Executable (generic) a (10002005/4) 49.75%
                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                  • Windows Screen Saver (13104/52) 0.07%
                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                  File name:fg}.exe
                                  File size:59'392 bytes
                                  MD5:e9a886374becfb0a5b1dc0ffcee1a04a
                                  SHA1:c692a6e9437299878b43ea5fa8ee1be0e1f5c782
                                  SHA256:7e694dfc8060bbbaf8c4139f974696d5fc3be48bd9d9d46eb166f55f7c024fb2
                                  SHA512:bc9e0affc52ea052eebf1d4b2aff0e89bec9b4780f14914ef14e27bb44a83e266791555fd79b5c1117953b37fe4623b2f6afeffb4f281a0d94e9a4261b882284
                                  SSDEEP:1536:R3iKaQ7P66xgWbXPIT+VvVkby0A4OiUheAImOF+V3:fPFN0Tg9kby0siA/ROF+V3
                                  TLSH:83436A1837F60225F2FF5FF529E16162C639F7236903965F24C902DA0713A8ACD51AF6
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...H..f............................>.... ........@.. .......................@............@................................
                                  Icon Hash:00928e8e8686b000
                                  Entrypoint:0x40fc3e
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x66831D48 [Mon Jul 1 21:19:04 2024 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                  Instruction
                                  jmp dword ptr [00402000h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xfbf00x4b.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x100000x4be.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x120000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000xdc440xde00baa958dc94d5b167404e977146ec8d4fFalse0.6002956081081081data5.991674708313243IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rsrc0x100000x4be0x600635a1219cb3c0e23809638fc919ab03dFalse0.3697916666666667data3.686881748510271IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x120000xc0x20058ee1032f6af482ce652886dbcd7809cFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_VERSION0x100a00x234data0.4716312056737589
                                  RT_MANIFEST0x102d40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                  DLLImport
                                  mscoree.dll_CorExeMain
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jul 2, 2024 00:32:08.283756018 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:32:08.289947033 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:32:08.290194988 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:32:08.474205971 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:32:08.480635881 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:32:20.420104027 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:32:20.427763939 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:32:32.380182028 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:32:32.384958982 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:32:44.320082903 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:32:44.327402115 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:32:56.273180962 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:32:56.279546976 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:33:08.226607084 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:33:08.233464956 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:33:09.476289034 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:33:09.482713938 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:33:20.335757971 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:33:20.342751026 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:33:20.351176023 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:33:20.358215094 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:33:20.366816998 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:33:20.373672962 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:33:20.398129940 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:33:20.402987003 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:33:20.414129972 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:33:20.419013023 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:33:20.429286003 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:33:20.434169054 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:33:25.413786888 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:33:25.420149088 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:33:34.274250031 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:33:34.280606031 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:33:35.601562977 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:33:35.606400013 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:33:35.710988998 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:33:35.715758085 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:33:35.758014917 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:33:35.762754917 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:33:36.882520914 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:33:36.887677908 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:33:38.383049011 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:33:38.389580011 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:33:38.945117950 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:33:38.951742887 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:33:40.913786888 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:33:40.920202971 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:33:44.179810047 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:33:44.186912060 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:33:53.164052963 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:33:53.171169043 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:33:58.024579048 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:33:58.033519030 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:33:58.992074966 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:33:58.998759031 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:01.414079905 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:01.419080019 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:02.226635933 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:02.231954098 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:02.242299080 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:02.250699997 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:02.289421082 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:02.296400070 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:07.601511002 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:07.607888937 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:07.617067099 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:07.624032021 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:07.648293018 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:07.655318022 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:07.773552895 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:07.780433893 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:07.804647923 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:07.811419964 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:07.820195913 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:07.826709032 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:07.867064953 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:07.875735044 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:07.882869959 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:07.889520884 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:07.914063931 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:07.920452118 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:07.945328951 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:07.951540947 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:07.960812092 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:07.967046976 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:07.976371050 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:07.982722044 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:08.039118052 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:08.046104908 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:09.820207119 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:09.826582909 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:21.785737038 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:22.007431030 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:22.319930077 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:22.746247053 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:22.746259928 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:22.746268034 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:22.976600885 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:22.983740091 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:25.446165085 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:25.452150106 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:25.617252111 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:25.622734070 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:31.148428917 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:31.366837978 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:31.387351990 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:31.387366056 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:33.648632050 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:33.655334949 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:38.900151014 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:38.907917023 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:42.461194992 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:42.467982054 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:43.757795095 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:43.764770985 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:43.898646116 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:43.907260895 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:44.179766893 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:44.187383890 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:44.195552111 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:44.202931881 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:54.367341995 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:54.372127056 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:34:59.773411989 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:34:59.781447887 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:05.335978031 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:05.342515945 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:10.539167881 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:10.545511961 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:10.570318937 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:10.575361967 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:10.585954905 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:10.591981888 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:12.961075068 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:12.968214035 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:15.711249113 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:15.717544079 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:15.726608992 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:15.733087063 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:27.679828882 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:27.684683084 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:28.959491968 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:28.962657928 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:30.883028984 CEST4970654251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:30.887070894 CEST5705754251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:30.890341997 CEST5425149706147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:30.893811941 CEST5425157057147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:30.894295931 CEST5705754251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:31.019138098 CEST5705754251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:31.023977041 CEST5425157057147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:31.039150953 CEST5705754251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:31.043953896 CEST5425157057147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:36.148578882 CEST5705754251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:36.155071974 CEST5425157057147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:36.273605108 CEST5705754251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:36.279881954 CEST5425157057147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:36.289243937 CEST5705754251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:36.295341015 CEST5425157057147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:36.320528984 CEST5705754251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:36.326968908 CEST5425157057147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:36.601821899 CEST5705754251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:36.608747959 CEST5425157057147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:36.664205074 CEST5705754251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:36.670938015 CEST5425157057147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:36.679909945 CEST5705754251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:36.686486959 CEST5425157057147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:36.695408106 CEST5705754251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:36.702387094 CEST5425157057147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:36.711093903 CEST5705754251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:36.717653036 CEST5425157057147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:40.368356943 CEST5705754251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:40.375300884 CEST5425157057147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:51.477274895 CEST5705754251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:51.483793020 CEST5425157057147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:55.104372025 CEST5705754251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:55.110842943 CEST5425157057147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:55.914397955 CEST5705754251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:55.921281099 CEST5425157057147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:57.985822916 CEST5705754251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:57.990684032 CEST5425157057147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:58.398704052 CEST5705754251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:58.406986952 CEST5425157057147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:58.414448023 CEST5705754251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:58.419533968 CEST5425157057147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:58.430017948 CEST5705754251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:58.435175896 CEST5425157057147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:58.508311987 CEST5705754251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:58.513259888 CEST5425157057147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:58.523638964 CEST5705754251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:58.528517962 CEST5425157057147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:58.586153030 CEST5705754251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:58.592602015 CEST5425157057147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:58.601670027 CEST5705754251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:58.606570005 CEST5425157057147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:58.617806911 CEST5705754251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:58.622623920 CEST5425157057147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:58.633107901 CEST5705754251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:58.638025045 CEST5425157057147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:35:58.648669004 CEST5705754251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:35:58.653539896 CEST5425157057147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:36:03.898994923 CEST5705754251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:36:03.903994083 CEST5425157057147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:36:03.914510965 CEST5705754251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:36:03.919512033 CEST5425157057147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:36:04.101852894 CEST5705754251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:36:04.106971025 CEST5425157057147.185.221.20192.168.2.9
                                  Jul 2, 2024 00:36:06.633133888 CEST5705754251192.168.2.9147.185.221.20
                                  Jul 2, 2024 00:36:06.640301943 CEST5425157057147.185.221.20192.168.2.9
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jul 2, 2024 00:32:08.254940033 CEST5726953192.168.2.91.1.1.1
                                  Jul 2, 2024 00:32:08.266727924 CEST53572691.1.1.1192.168.2.9
                                  Jul 2, 2024 00:32:20.282305002 CEST53557121.1.1.1192.168.2.9
                                  Jul 2, 2024 00:32:21.813931942 CEST53631161.1.1.1192.168.2.9
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Jul 2, 2024 00:32:08.254940033 CEST192.168.2.91.1.1.10xbcdeStandard query (0)people-climbing.gl.at.ply.ggA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Jul 2, 2024 00:32:08.266727924 CEST1.1.1.1192.168.2.90xbcdeNo error (0)people-climbing.gl.at.ply.gg147.185.221.20A (IP address)IN (0x0001)false

                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Target ID:0
                                  Start time:18:31:58
                                  Start date:01/07/2024
                                  Path:C:\Users\user\Desktop\fg}.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Users\user\Desktop\fg}.exe"
                                  Imagebase:0x4d0000
                                  File size:59'392 bytes
                                  MD5 hash:E9A886374BECFB0A5B1DC0FFCEE1A04A
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000000.1314086519.00000000004D2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000000.1314086519.00000000004D2000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                  Reputation:low
                                  Has exited:false

                                  Reset < >
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3780667056.00007FF886E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886E20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff886e20000_fg}.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: SAO_^
                                    • API String ID: 0-3650529936
                                    • Opcode ID: fa24e017852f6536c076565492910c6c4b217feeab1970d1a707b4b9671ac4d1
                                    • Instruction ID: b44f826614642f315dcb5c68a9afd09b50d85df20c3a0f516858e5d870ba7ebc
                                    • Opcode Fuzzy Hash: fa24e017852f6536c076565492910c6c4b217feeab1970d1a707b4b9671ac4d1
                                    • Instruction Fuzzy Hash: CF02A171A2CA494BEB94EB7C84697B97BD2FF99740F500579E40EC33D2DE28AC418742
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3780667056.00007FF886E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886E20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff886e20000_fg}.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 311849e37b2d7d16c51ab6be56d81647cc93eb843e2ab5d9216c920aec507cb8
                                    • Instruction ID: ab31e142981f76ebb528a3239dc6604721cf2aa3a0356ec1dd65b4a3bdc85ec6
                                    • Opcode Fuzzy Hash: 311849e37b2d7d16c51ab6be56d81647cc93eb843e2ab5d9216c920aec507cb8
                                    • Instruction Fuzzy Hash: 29F1B430918A4D8FEFA8DF28C8957E977E2FF54350F14426AE84DC7291DB389945CB82
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3780667056.00007FF886E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886E20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff886e20000_fg}.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 07d82ec479a938d3e55a5c6a774f8bab93629e55bd4d01e2f1b7211e735aaa96
                                    • Instruction ID: cc2ad4adbfc1ff0d7be403fb175d927d5d33cf93089f2f98414e73cd065ae4b0
                                    • Opcode Fuzzy Hash: 07d82ec479a938d3e55a5c6a774f8bab93629e55bd4d01e2f1b7211e735aaa96
                                    • Instruction Fuzzy Hash: 0AE1B470908A4E8FEBA8DF28C8557EA77D2FF54350F14426EE84DC7291DE38A945CB81
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3780667056.00007FF886E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886E20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff886e20000_fg}.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e50136f01790fc8fd3d0ee3c2175b2819d53c2ee8c876aaeec862e80193b6713
                                    • Instruction ID: 49ac00435d891db69ff69520a75134471b7adcd8d8e4ff63d1d8e6e431875c09
                                    • Opcode Fuzzy Hash: e50136f01790fc8fd3d0ee3c2175b2819d53c2ee8c876aaeec862e80193b6713
                                    • Instruction Fuzzy Hash: 1941F47190C6888FDB19DFA89845AF9BBF1FF56311F14016EE08AC3293DA646846C791
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3780667056.00007FF886E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886E20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff886e20000_fg}.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ae06e678dc6b45193e2b72343cd15c987e470250187d2738478eeb235cd9bb38
                                    • Instruction ID: 125826d2db8fd04860f73c72f50617cd9f7c05053ee9e795309eaa042c4afb77
                                    • Opcode Fuzzy Hash: ae06e678dc6b45193e2b72343cd15c987e470250187d2738478eeb235cd9bb38
                                    • Instruction Fuzzy Hash: AD51EBA7E2D56205F3117BFD74152EA2B40DFE23B5B188577E1CC8E1D3DD0C248A829A