Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
eternal.exe

Overview

General Information

Sample name:eternal.exe
Analysis ID:1557108
MD5:7439cc991a9a756c41153b8e9121baab
SHA1:c62528386e5f62ff2975cc8ed0cad3a7d362e632
SHA256:31a2b821e933bb193d94438d4a5aa036519535336c936d65b66889fb03164e2d
Tags:exeuser-aachum
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for dropped file
Machine Learning detection for sample
Protects its processes via BreakOnTermination flag
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious Schtasks From Env Var Folder
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • eternal.exe (PID: 1704 cmdline: "C:\Users\user\Desktop\eternal.exe" MD5: 7439CC991A9A756C41153B8E9121BAAB)
    • schtasks.exe (PID: 2136 cmdline: "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\user\AppData\Roaming\XClient.exe" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • conhost.exe (PID: 7008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • XClient.exe (PID: 5552 cmdline: C:\Users\user\AppData\Roaming\XClient.exe MD5: 7439CC991A9A756C41153B8E9121BAAB)
  • XClient.exe (PID: 3376 cmdline: "C:\Users\user\AppData\Roaming\XClient.exe" MD5: 7439CC991A9A756C41153B8E9121BAAB)
  • XClient.exe (PID: 2052 cmdline: "C:\Users\user\AppData\Roaming\XClient.exe" MD5: 7439CC991A9A756C41153B8E9121BAAB)
  • XClient.exe (PID: 4436 cmdline: C:\Users\user\AppData\Roaming\XClient.exe MD5: 7439CC991A9A756C41153B8E9121BAAB)
  • XClient.exe (PID: 5852 cmdline: C:\Users\user\AppData\Roaming\XClient.exe MD5: 7439CC991A9A756C41153B8E9121BAAB)
  • XClient.exe (PID: 5984 cmdline: C:\Users\user\AppData\Roaming\XClient.exe MD5: 7439CC991A9A756C41153B8E9121BAAB)
  • XClient.exe (PID: 3668 cmdline: C:\Users\user\AppData\Roaming\XClient.exe MD5: 7439CC991A9A756C41153B8E9121BAAB)
  • cleanup
{"C2 url": ["147.185.221.23"], "Port": 33942, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe"}
SourceRuleDescriptionAuthorStrings
eternal.exeJoeSecurity_XWormYara detected XWormJoe Security
    eternal.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0xfc4e:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0xfceb:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0xfe00:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0xebac:$cnc4: POST / HTTP/1.1
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\XClient.exeJoeSecurity_XWormYara detected XWormJoe Security
      C:\Users\user\AppData\Roaming\XClient.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0xfc4e:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0xfceb:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0xfe00:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0xebac:$cnc4: POST / HTTP/1.1
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.1344837200.0000000000D32000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_XWormYara detected XWormJoe Security
        00000000.00000000.1344837200.0000000000D32000.00000002.00000001.01000000.00000003.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
        • 0xfa4e:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
        • 0xfaeb:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
        • 0xfc00:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
        • 0xe9ac:$cnc4: POST / HTTP/1.1
        Process Memory Space: eternal.exe PID: 1704JoeSecurity_XWormYara detected XWormJoe Security
          SourceRuleDescriptionAuthorStrings
          0.0.eternal.exe.d30000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
            0.0.eternal.exe.d30000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0xfc4e:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0xfceb:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0xfe00:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0xebac:$cnc4: POST / HTTP/1.1

            System Summary

            barindex
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\XClient.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\eternal.exe, ProcessId: 1704, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient
            Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\Desktop\eternal.exe, ProcessId: 1704, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\user\AppData\Roaming\XClient.exe", CommandLine: "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\user\AppData\Roaming\XClient.exe", CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\eternal.exe", ParentImage: C:\Users\user\Desktop\eternal.exe, ParentProcessId: 1704, ParentProcessName: eternal.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\user\AppData\Roaming\XClient.exe", ProcessId: 2136, ProcessName: schtasks.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-17T11:25:11.545747+010028531931Malware Command and Control Activity Detected192.168.2.953557147.185.221.2333942TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: eternal.exeAvira: detected
            Source: C:\Users\user\AppData\Roaming\XClient.exeAvira: detection malicious, Label: TR/Spy.Gen
            Source: eternal.exeMalware Configuration Extractor: Xworm {"C2 url": ["147.185.221.23"], "Port": 33942, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe"}
            Source: 147.185.221.23Virustotal: Detection: 17%Perma Link
            Source: C:\Users\user\AppData\Roaming\XClient.exeReversingLabs: Detection: 73%
            Source: C:\Users\user\AppData\Roaming\XClient.exeVirustotal: Detection: 67%Perma Link
            Source: eternal.exeReversingLabs: Detection: 73%
            Source: eternal.exeVirustotal: Detection: 67%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Roaming\XClient.exeJoe Sandbox ML: detected
            Source: eternal.exeJoe Sandbox ML: detected
            Source: eternal.exeString decryptor: 147.185.221.23
            Source: eternal.exeString decryptor: 33942
            Source: eternal.exeString decryptor: <123456789>
            Source: eternal.exeString decryptor: <Xwormmm>
            Source: eternal.exeString decryptor: Group1
            Source: eternal.exeString decryptor: USB.exe
            Source: eternal.exeString decryptor: %AppData%
            Source: eternal.exeString decryptor: XClient.exe
            Source: eternal.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: eternal.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2855924 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.9:53547 -> 147.185.221.23:33942
            Source: Network trafficSuricata IDS: 2853193 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.9:53557 -> 147.185.221.23:33942
            Source: Malware configuration extractorURLs: 147.185.221.23
            Source: global trafficTCP traffic: 192.168.2.9:49777 -> 147.185.221.23:33942
            Source: Joe Sandbox ViewIP Address: 147.185.221.23 147.185.221.23
            Source: Joe Sandbox ViewASN Name: SALSGIVERUS SALSGIVERUS
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.23
            Source: global trafficDNS traffic detected: DNS query: 171.39.242.20.in-addr.arpa
            Source: eternal.exe, 00000000.00000002.3795426043.0000000003161000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

            Operating System Destruction

            barindex
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: 01 00 00 00 Jump to behavior

            System Summary

            barindex
            Source: eternal.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 0.0.eternal.exe.d30000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000000.00000000.1344837200.0000000000D32000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: C:\Users\user\AppData\Roaming\XClient.exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: C:\Users\user\Desktop\eternal.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\eternal.exeCode function: 0_2_00007FF887CF186D0_2_00007FF887CF186D
            Source: C:\Users\user\Desktop\eternal.exeCode function: 0_2_00007FF887CFA3D20_2_00007FF887CFA3D2
            Source: C:\Users\user\Desktop\eternal.exeCode function: 0_2_00007FF887CF96260_2_00007FF887CF9626
            Source: C:\Users\user\Desktop\eternal.exeCode function: 0_2_00007FF887CF20590_2_00007FF887CF2059
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 4_2_00007FF887CF0C3E4_2_00007FF887CF0C3E
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 4_2_00007FF887CF186D4_2_00007FF887CF186D
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 4_2_00007FF887CF20594_2_00007FF887CF2059
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 6_2_00007FF887CE186D6_2_00007FF887CE186D
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 6_2_00007FF887CE0E686_2_00007FF887CE0E68
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 6_2_00007FF887CE20596_2_00007FF887CE2059
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 7_2_00007FF887CF0C3E7_2_00007FF887CF0C3E
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 7_2_00007FF887CF186D7_2_00007FF887CF186D
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 7_2_00007FF887CF20597_2_00007FF887CF2059
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 10_2_00007FF887D10C3E10_2_00007FF887D10C3E
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 10_2_00007FF887D1205910_2_00007FF887D12059
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 10_2_00007FF887D1186D10_2_00007FF887D1186D
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 12_2_00007FF887CE186D12_2_00007FF887CE186D
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 12_2_00007FF887CE0E6812_2_00007FF887CE0E68
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 12_2_00007FF887CE205912_2_00007FF887CE2059
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 13_2_00007FF887D00C3E13_2_00007FF887D00C3E
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 13_2_00007FF887D0186D13_2_00007FF887D0186D
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 13_2_00007FF887D0205913_2_00007FF887D02059
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 14_2_00007FF887D10C3E14_2_00007FF887D10C3E
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 14_2_00007FF887D1205914_2_00007FF887D12059
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 14_2_00007FF887D1186D14_2_00007FF887D1186D
            Source: eternal.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: eternal.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 0.0.eternal.exe.d30000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000000.00000000.1344837200.0000000000D32000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: C:\Users\user\AppData\Roaming\XClient.exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: eternal.exe, z7GL3GcSz0bU9xxBylPHvbaUX8.csCryptographic APIs: 'TransformFinalBlock'
            Source: eternal.exe, z7GL3GcSz0bU9xxBylPHvbaUX8.csCryptographic APIs: 'TransformFinalBlock'
            Source: eternal.exe, pwLyC8IGS9fWPw8AOOpq13VTDw.csCryptographic APIs: 'TransformFinalBlock'
            Source: XClient.exe.0.dr, z7GL3GcSz0bU9xxBylPHvbaUX8.csCryptographic APIs: 'TransformFinalBlock'
            Source: XClient.exe.0.dr, z7GL3GcSz0bU9xxBylPHvbaUX8.csCryptographic APIs: 'TransformFinalBlock'
            Source: XClient.exe.0.dr, pwLyC8IGS9fWPw8AOOpq13VTDw.csCryptographic APIs: 'TransformFinalBlock'
            Source: eternal.exe, ehFF3g5JMWmvPBY7f8PHXvmxPU1QBWGhSW9HZi8z2cL2PB9AU.csBase64 encoded string: 'zwUuG1nByTCEbaZKHWOAlu2mCDp7JUhoMorAGSUIUqs7jGnGSWfcL7nHRupmiUNZgDRBDBUz7hlO'
            Source: eternal.exe, OikC8q0jRtn3fHthyLWpHpUTg7BlI3UgPeim5M0jeam7kzrAn.csBase64 encoded string: 'nOPvjGtOiWrak5U6dMLaaYXnV5efRXgPksc1lS1MhJkqNd2g2hTJrZQwTI60OSsaRSVeV0APlUZT'
            Source: eternal.exe, fHfgyTqtDDXlgFY83FcOCVN0lmCsgZzHJUE3KRMC6.csBase64 encoded string: 'r9ZP2HoqHH770WDyWixlEX8ZRUYr87OFDSl4HtLk1VmHoDXC9z7gjvEpvEhFSKRin9IH', 'Yr6d8vHWsl1qg9CkWxf6ZUUnm0jR7Ke4Mfc2h4jChLnQgdVIMGjbfPrKphFxKxQHby6f', 'meCKLNBFqzdfahnjOzKN2HfHAYWoXX3kR875tED3tufBVEQEvOWeT72R871e8kvPOCp7', 't8tUYo6qF3AbbmaIzYNdk1tEW1YDNbUFN7MOTWhg89CaDB7M29qu4afdXBX3c9m8R74p', 'yOif5zu6batbtJMG78mjMggTXaUoZCMKTy1x4aM2XVeveuayD5ImGboaJ8MvCFi5Bzzl', 'hp5gyXDcXfr0IbLlGgN4BEoDIMeolWnxebvOOVVABA0hQ5FhBVeK5kTjAOFLkt2bpUb2'
            Source: XClient.exe.0.dr, ehFF3g5JMWmvPBY7f8PHXvmxPU1QBWGhSW9HZi8z2cL2PB9AU.csBase64 encoded string: 'zwUuG1nByTCEbaZKHWOAlu2mCDp7JUhoMorAGSUIUqs7jGnGSWfcL7nHRupmiUNZgDRBDBUz7hlO'
            Source: XClient.exe.0.dr, OikC8q0jRtn3fHthyLWpHpUTg7BlI3UgPeim5M0jeam7kzrAn.csBase64 encoded string: 'nOPvjGtOiWrak5U6dMLaaYXnV5efRXgPksc1lS1MhJkqNd2g2hTJrZQwTI60OSsaRSVeV0APlUZT'
            Source: XClient.exe.0.dr, fHfgyTqtDDXlgFY83FcOCVN0lmCsgZzHJUE3KRMC6.csBase64 encoded string: 'r9ZP2HoqHH770WDyWixlEX8ZRUYr87OFDSl4HtLk1VmHoDXC9z7gjvEpvEhFSKRin9IH', 'Yr6d8vHWsl1qg9CkWxf6ZUUnm0jR7Ke4Mfc2h4jChLnQgdVIMGjbfPrKphFxKxQHby6f', 'meCKLNBFqzdfahnjOzKN2HfHAYWoXX3kR875tED3tufBVEQEvOWeT72R871e8kvPOCp7', 't8tUYo6qF3AbbmaIzYNdk1tEW1YDNbUFN7MOTWhg89CaDB7M29qu4afdXBX3c9m8R74p', 'yOif5zu6batbtJMG78mjMggTXaUoZCMKTy1x4aM2XVeveuayD5ImGboaJ8MvCFi5Bzzl', 'hp5gyXDcXfr0IbLlGgN4BEoDIMeolWnxebvOOVVABA0hQ5FhBVeK5kTjAOFLkt2bpUb2'
            Source: XClient.exe.0.dr, IsDp1ecpTFNA4aR1tkuj7x6jBnVeFOWVVQprEerK5JT5WDvVxJvOqcheXfyHjH2HvZRfEKvHfLNgLVkvs.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: XClient.exe.0.dr, IsDp1ecpTFNA4aR1tkuj7x6jBnVeFOWVVQprEerK5JT5WDvVxJvOqcheXfyHjH2HvZRfEKvHfLNgLVkvs.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: eternal.exe, IsDp1ecpTFNA4aR1tkuj7x6jBnVeFOWVVQprEerK5JT5WDvVxJvOqcheXfyHjH2HvZRfEKvHfLNgLVkvs.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: eternal.exe, IsDp1ecpTFNA4aR1tkuj7x6jBnVeFOWVVQprEerK5JT5WDvVxJvOqcheXfyHjH2HvZRfEKvHfLNgLVkvs.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: classification engineClassification label: mal100.troj.evad.winEXE@11/4@1/1
            Source: C:\Users\user\Desktop\eternal.exeFile created: C:\Users\user\AppData\Roaming\XClient.exeJump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7008:120:WilError_03
            Source: C:\Users\user\AppData\Roaming\XClient.exeMutant created: NULL
            Source: C:\Users\user\Desktop\eternal.exeMutant created: \Sessions\1\BaseNamedObjects\Z7DjfJsbzoeA8FRF
            Source: C:\Users\user\Desktop\eternal.exeFile created: C:\Users\user\AppData\Local\Temp\Log.tmpJump to behavior
            Source: eternal.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: eternal.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
            Source: C:\Users\user\Desktop\eternal.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: eternal.exeReversingLabs: Detection: 73%
            Source: eternal.exeVirustotal: Detection: 67%
            Source: C:\Users\user\Desktop\eternal.exeFile read: C:\Users\user\Desktop\eternal.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\eternal.exe "C:\Users\user\Desktop\eternal.exe"
            Source: C:\Users\user\Desktop\eternal.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\user\AppData\Roaming\XClient.exe"
            Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\XClient.exe C:\Users\user\AppData\Roaming\XClient.exe
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\XClient.exe "C:\Users\user\AppData\Roaming\XClient.exe"
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\XClient.exe "C:\Users\user\AppData\Roaming\XClient.exe"
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\XClient.exe C:\Users\user\AppData\Roaming\XClient.exe
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\XClient.exe C:\Users\user\AppData\Roaming\XClient.exe
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\XClient.exe C:\Users\user\AppData\Roaming\XClient.exe
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\XClient.exe C:\Users\user\AppData\Roaming\XClient.exe
            Source: C:\Users\user\Desktop\eternal.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\user\AppData\Roaming\XClient.exe"Jump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: scrrun.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: linkinfo.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: ntshrui.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: cscapi.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: avicap32.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: msvfw32.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{5E5F29CE-E0A8-49D3-AF32-7A7BDC173478}\InProcServer32Jump to behavior
            Source: XClient.lnk.0.drLNK file: ..\..\..\..\..\XClient.exe
            Source: eternal.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: eternal.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: eternal.exe, iQddWXbGwScqaHBkFEbMdof0OJRNz6u4WQnCKQbCS74w3fx02XLpJaDmKNJJPrSVG2hzVLqa8pl1ZFhxjBtSfLKqOzinxt5zUPR.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{LGrh1xeznUsOqYjAKG6NV80aR9CC8J3FhBQD7qBRvte9ULxnP.U2xZS9Ii0bNLwN14STRo7hwBRPZhfM0aicc7EKEBlrFHxeDFy,LGrh1xeznUsOqYjAKG6NV80aR9CC8J3FhBQD7qBRvte9ULxnP.klGcTAcrhqPTSR6ORizJ2c7HcRMpsdc3i6nBTyBWta4vxEDVy,LGrh1xeznUsOqYjAKG6NV80aR9CC8J3FhBQD7qBRvte9ULxnP.e1a4iS5m2cwY7Wz4tf9JJh8YkbpTv1LUNuS5AGzigkLRqkULl,LGrh1xeznUsOqYjAKG6NV80aR9CC8J3FhBQD7qBRvte9ULxnP.zddVe2zadHhHeDck7teLRxIVYabLIJuFmKSkvkzjoYfQwS95L,z7GL3GcSz0bU9xxBylPHvbaUX8.BvRcOGTXZLhNVW8VvUiYmleWf3IvqmgfkWjeLSwSzGNWB3uGR2J9VQkAvHh()}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: eternal.exe, iQddWXbGwScqaHBkFEbMdof0OJRNz6u4WQnCKQbCS74w3fx02XLpJaDmKNJJPrSVG2hzVLqa8pl1ZFhxjBtSfLKqOzinxt5zUPR.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{LSIheGR5jimET3JBt5sQs3uzkBQfaD2U2r8HNuqXo[2],z7GL3GcSz0bU9xxBylPHvbaUX8.aUh9qYlzTyllGrbrPVeJLz9A4o4sfJf9qsZ9CQe2zFJG296vAZakwP5nCJA(Convert.FromBase64String(LSIheGR5jimET3JBt5sQs3uzkBQfaD2U2r8HNuqXo[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: XClient.exe.0.dr, iQddWXbGwScqaHBkFEbMdof0OJRNz6u4WQnCKQbCS74w3fx02XLpJaDmKNJJPrSVG2hzVLqa8pl1ZFhxjBtSfLKqOzinxt5zUPR.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{LGrh1xeznUsOqYjAKG6NV80aR9CC8J3FhBQD7qBRvte9ULxnP.U2xZS9Ii0bNLwN14STRo7hwBRPZhfM0aicc7EKEBlrFHxeDFy,LGrh1xeznUsOqYjAKG6NV80aR9CC8J3FhBQD7qBRvte9ULxnP.klGcTAcrhqPTSR6ORizJ2c7HcRMpsdc3i6nBTyBWta4vxEDVy,LGrh1xeznUsOqYjAKG6NV80aR9CC8J3FhBQD7qBRvte9ULxnP.e1a4iS5m2cwY7Wz4tf9JJh8YkbpTv1LUNuS5AGzigkLRqkULl,LGrh1xeznUsOqYjAKG6NV80aR9CC8J3FhBQD7qBRvte9ULxnP.zddVe2zadHhHeDck7teLRxIVYabLIJuFmKSkvkzjoYfQwS95L,z7GL3GcSz0bU9xxBylPHvbaUX8.BvRcOGTXZLhNVW8VvUiYmleWf3IvqmgfkWjeLSwSzGNWB3uGR2J9VQkAvHh()}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: XClient.exe.0.dr, iQddWXbGwScqaHBkFEbMdof0OJRNz6u4WQnCKQbCS74w3fx02XLpJaDmKNJJPrSVG2hzVLqa8pl1ZFhxjBtSfLKqOzinxt5zUPR.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{LSIheGR5jimET3JBt5sQs3uzkBQfaD2U2r8HNuqXo[2],z7GL3GcSz0bU9xxBylPHvbaUX8.aUh9qYlzTyllGrbrPVeJLz9A4o4sfJf9qsZ9CQe2zFJG296vAZakwP5nCJA(Convert.FromBase64String(LSIheGR5jimET3JBt5sQs3uzkBQfaD2U2r8HNuqXo[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: eternal.exe, iQddWXbGwScqaHBkFEbMdof0OJRNz6u4WQnCKQbCS74w3fx02XLpJaDmKNJJPrSVG2hzVLqa8pl1ZFhxjBtSfLKqOzinxt5zUPR.cs.Net Code: o4DruXGjL07o2HIFSRdU1PNswHXNNiP4YoTvKJjE1DPXeiunlYhlqIeliXadQH1QXJgcgn6jIzq13184TVW4yyI4fojGlGN86m3 System.AppDomain.Load(byte[])
            Source: eternal.exe, iQddWXbGwScqaHBkFEbMdof0OJRNz6u4WQnCKQbCS74w3fx02XLpJaDmKNJJPrSVG2hzVLqa8pl1ZFhxjBtSfLKqOzinxt5zUPR.cs.Net Code: _2E6ai9TR6tMMsIluNA30k9trZCLJSDwrf8inyh3Qp System.AppDomain.Load(byte[])
            Source: eternal.exe, iQddWXbGwScqaHBkFEbMdof0OJRNz6u4WQnCKQbCS74w3fx02XLpJaDmKNJJPrSVG2hzVLqa8pl1ZFhxjBtSfLKqOzinxt5zUPR.cs.Net Code: _2E6ai9TR6tMMsIluNA30k9trZCLJSDwrf8inyh3Qp
            Source: XClient.exe.0.dr, iQddWXbGwScqaHBkFEbMdof0OJRNz6u4WQnCKQbCS74w3fx02XLpJaDmKNJJPrSVG2hzVLqa8pl1ZFhxjBtSfLKqOzinxt5zUPR.cs.Net Code: o4DruXGjL07o2HIFSRdU1PNswHXNNiP4YoTvKJjE1DPXeiunlYhlqIeliXadQH1QXJgcgn6jIzq13184TVW4yyI4fojGlGN86m3 System.AppDomain.Load(byte[])
            Source: XClient.exe.0.dr, iQddWXbGwScqaHBkFEbMdof0OJRNz6u4WQnCKQbCS74w3fx02XLpJaDmKNJJPrSVG2hzVLqa8pl1ZFhxjBtSfLKqOzinxt5zUPR.cs.Net Code: _2E6ai9TR6tMMsIluNA30k9trZCLJSDwrf8inyh3Qp System.AppDomain.Load(byte[])
            Source: XClient.exe.0.dr, iQddWXbGwScqaHBkFEbMdof0OJRNz6u4WQnCKQbCS74w3fx02XLpJaDmKNJJPrSVG2hzVLqa8pl1ZFhxjBtSfLKqOzinxt5zUPR.cs.Net Code: _2E6ai9TR6tMMsIluNA30k9trZCLJSDwrf8inyh3Qp
            Source: C:\Users\user\Desktop\eternal.exeCode function: 0_2_00007FF887CF5699 push ebx; retf 0_2_00007FF887CF59DA
            Source: C:\Users\user\Desktop\eternal.exeCode function: 0_2_00007FF887CF24AD push E95DD73Bh; retf 0_2_00007FF887CF2589
            Source: C:\Users\user\Desktop\eternal.exeCode function: 0_2_00007FF887CF243D push E95DD73Bh; retf 0_2_00007FF887CF2589
            Source: C:\Users\user\Desktop\eternal.exeCode function: 0_2_00007FF887CF2EA8 push eax; iretd 0_2_00007FF887CF2EC1
            Source: C:\Users\user\Desktop\eternal.exeCode function: 0_2_00007FF887CF2D3A push eax; iretd 0_2_00007FF887CF2EC1
            Source: eternal.exe, PNTkHhRdRADo9Htu8dbFVLGTwqCu2qbzjYH5zYlur5KxgSz1jQZuw8evWYvsSGwZnSHAYTXqL6hUBfvaIp2CoAMx26V.csHigh entropy of concatenated method names: '_0c5osAYdBH9XJ94w4zO6l972AlhrdGad0hqnAFgCFDwSXcziYUz2q1XXqL3Zde5p35YLYKckiT7zmCnBswlBhvyUlKO', 'zTL2B64wg2rWQWqASrnYspHnl0Z1Aumla4SUxs4D64pQI2WON1JnzP1oGkeyMwLMnb0f8QieLG4h', 'rkr0zO6T26LPtwV3U9c2u5xYBuctzMPqkJXb8TIBxlUKlPIg8rAaiHfjLP71Hzw255mMcNkH7LQq', 'Btv4maALwmARX', 'HJNgJkbLwyzIr', 'EHT5RPoBsAnvY', 'U5FhaAIW2Nj2K', '_7zTNkjNQ0QD3c', 'hQgK5oM9YmxrQ', 'LnSuQAe3DhXZ2'
            Source: eternal.exe, ehFF3g5JMWmvPBY7f8PHXvmxPU1QBWGhSW9HZi8z2cL2PB9AU.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'Ea65l0P6VLiuAGdcSTuvjZVcwJgbGY1253l4vMwdSVADH492dX4PnHlSS35V2YM5c6dN3ZqKdkec', 'kOmiM1AbuLNjuLBf89wLzzjhN1Q3cqGGQEB6xJwPBYbBFOr4CSGH78YstQzx2itJcGbuOsGxLZKK', 'xGK7vCJFSYRW1gcvS6EUjMnJRR8OBcSkO5EdL9avx0j551WfeEgaTLxv1eSH4wQTZWjFIcRo4bUj', 'ERiYjJBn6pFxsGNYLGgy8QzMDp73EOBHgudvczYH3MSATieVEHc6hvYTbAy3glIC6sE2LzEEvOMf'
            Source: eternal.exe, ZTVYtJFrmsQJQ9ljOwNBcyaFo9DitMyOY4oipU4ny.csHigh entropy of concatenated method names: 'NoCle4xZmufxswDeh5fhpTUgoSAb5eavmQrRgKskO', 'zZWCPg3bEKG534TZwNRhlqsIneV7P6FWDiwU', '_2yRRy4y5sBKarxi31GYBsSZgy2BbH10JSslb', 'f9J0BO2UoDn7uyJSkFmSMqD2U0CLAbQJIjKF', 'jF9RGodWK3s5qoVwiawclr9bGbBnIk6BZnQH'
            Source: eternal.exe, IsDp1ecpTFNA4aR1tkuj7x6jBnVeFOWVVQprEerK5JT5WDvVxJvOqcheXfyHjH2HvZRfEKvHfLNgLVkvs.csHigh entropy of concatenated method names: 'k06g0iCbZCrfysspSRMUJhlvYv79m1SSzswTsLBuX8Uz3rCOToqYxOxgf2zC01crRWspIvgXQ8oEiE7TM', '_7zpgzbS6PiDyDJENNtstPc6AcDWETdl9qa8VBBfjip0JV0wNKaiUYqCSDNhWBNrFA2q5hZsTYIrwXV9eo', 'efanD038HcFIAEn81JcePjTZcmuYEb18URcxTmSvOhAn2vjbQL2CvMLKx5U8ELzWTMGmNEUgxjPFbQEUH', 'S6TBniyDwO1QE4SgIJD32eq9ggNzFjSC7eVHzx0pqJHhS5zDr1NKfdFiZ950zBN5SCgKu9PCd5pNKgRd4', '_5NB66cSsdfZl1wYpuBTFxnfbtIFkKthngYBP7aJYPI8h0KaVs8ob5oRSiwXQ0WpBTp3oQYyd9hCBeebIi', '_8auKXwrMjrWK6GETcQFbdg3Vp79uUUIPDb9Sy4WFo66QIUaj0mFhsh0uP1EDWfjJPZhOohG04ClP6EwKU', 'eZLULBsWHjkkBfq6UUkYqvjdfep7gP0Jsax6nfq8yPBu0kvptOtgeoAB89ekjARl0orRbLzx8vIrJJNzz', 'Uqe2k6rcLSu5PX1j4tOqUiz3AsHedfpnumnQKYbU0ZFOajGepCrXgVlcsAJjGLiJ3YS24bwh0hfa1TXHx', 'fPrS3IoE8AU3qNIg9y0bwAv5b2OwoCgc90vr3Dv9sCQsynP59RPumSLyr7wt2Q86BBiUuUlWpbuS75vgr', '_1bidLvfGyo8kT6sraMlH8OWiBDlbh3JTvPbdsjQ5ks4b8uEikoXH93LqXuA3XXmZXSrsBs1I2EenFSSKB'
            Source: eternal.exe, 07Cdq7Slaf2T0jZczBuwyUXHac.csHigh entropy of concatenated method names: 'aNTMw6Lu16q3XeWHR1sR3PMWSc', '_85n0wGBYXzEAGGt4l8PGE0RDXu', 'CTQ4WASzc8s72DCU4qjXS0CXRl', 'Pc3Yhm8jNS8GFjGCj9zEGX6vS0', '_4SJw3T4IWGV1RB84xPDOcTwCH0BWzCDx7Cv9O75zcJBpdLzVGT2sJz', 'V7c4x1ZactwY6IDS1gx8EozmV7NQKodI3NEVUIzH9cdwub65IquqG5', 'tSoF4ErRLVczkRNY4oAHQYpg18er1hxx2JuiJvKNPus0RjONzUM9Ty', 'cReP19Usgw2ijL8SFqsFgwdEKNtvIYJq2VudLBTLJe7lL7ul2XGIKU', 'KrU1gipWTZPHUOXxkvD6LuPOmDsvj4AojcsA06vZMleEQghmaWD9sW15aZKDoJY72JOLWqRzXCo68c64eXudEf', 'w2J7OZ6KgMoKAlYfNB0Zamm0AZZpzVfIOcLbbErEWdfgG9fasIJXDTSSjeekkiQQ54pP4m3ld4E0FbrPz2HFkh'
            Source: eternal.exe, fHfgyTqtDDXlgFY83FcOCVN0lmCsgZzHJUE3KRMC6.csHigh entropy of concatenated method names: 'eZmacRaUJwyo2V4YVB3fpVPcLirYMs9NgnkwDjFGp', 'd85CNq0UL5V9VHkpmg49vGPNv2eivxNFlfn6SA8Wa', 'aaPTnTrt8Ym4okXALJ8ARVYV41jgbEBIV1xhS5jpX', 'TipMraploFbtSJXkrL2wl7mQA2', '_8kYnfx2Lev1BuxUf3rf6rrRChf', 'YZm91ip80fd4eMng8qFrdBzNCg', 'IVWmqzIBjqA6oT2vjG5RkSmRor', 'Pr3QotefBmeLPnEJGZAv75JZ0Z', 'UxwYolw5crzg8rmsMOEamrwCXu', 'Sy558Qu3s6mdrFllG7ujEwVbsF'
            Source: eternal.exe, z7GL3GcSz0bU9xxBylPHvbaUX8.csHigh entropy of concatenated method names: 'rczOseSIc2vnwuEKIR8PkcLmQa', '_04nQsc5SubxMuXJO3AjPmX0xdl', 'hFjVWq8dAgGwLNBrQoIeKlZxVQ', 'HcqlO99QRe4SHd8BzMhTs7NGM5', 'l7FpTzsY57NomzQ8RfXN2HkWPh', 'PPwLymJlD5IyaA6OX8oJLKE2eo', 'j0lPXeA3krUBU4eIKwHZCHQo8t', 'JF3URgxYwq9OQvJS00u8hCO5H8vqmWwDRbmYItsSowCm6gCXAbEsZZZmIQL', 'nwctXyVSHKGY5OLwe9fqeakonwIxFSDgOXORZzO0z6k9imOZ8ltZE3IN43d', 'yRMsRhBMjHLebAC07aypKk8Xvd0Fr7wd5MRrNJbh59gRGeUCPCNh0DRN0FX'
            Source: eternal.exe, pwLyC8IGS9fWPw8AOOpq13VTDw.csHigh entropy of concatenated method names: 'q75ROLrqqHV6EmJDp91TOI4VmT', 'ZtBBrD6v9t5iKcxfvJFaw3H4IuoDdY5nuT9puJXpLcjL76IDfgCpHRRBmpJVtKBkLCrPDQOodEZjpRwSz7URN3', 'vfjRU45nEBY3auUaODMgdMoHtc4K9VQz4xOTtGT5Rs8N0nXwNGPIEGNdyM7MGhG3uPvvrFFxSVofALVPdeAZNJ', 'icSHmmvwaVgso4j8Hv3S4II3minVb10MWs5SQ63NpOLDYpHqrGopkznqOvYHFNLP1M4QnYgENy3C06mTgfD2bh', 'dpGjJ3p87EOacCY2vM0V24nVRlbrIREh0oXDjE2lWXatKNNzmuZcRV5SWjWaJ4VPQdH04vzaLiesjPJ7syopT7'
            Source: eternal.exe, YQhejhVgT0ttgMOLyMJxgFpqD9cch4ZRZCw8NY2M6T1GDPhoPLEM2UjD1FgvZhc5VommPhvhtQvJWFL27.csHigh entropy of concatenated method names: 'v2ZikujqPLr1n6uIoVRgCl1pTavRWrBtjGZIRMgHAOgEZQHb0xl2UCVnjLOjvu4tr2gJgE8b2IxKZqqDE', 'Te60wYfmJ74mvSBCHY9Q1NYDhkeXswsJzyOxyUzGodjeG1TZQE5uz4gUMoPwHqZv0IL8rkrclqK6sLhXa', 'lOttlYb7JhxgqWLTIpZwgApjN4IiY5lALQP1k3zDtevLeLQ0arZpIFqdSuNqZ8CtJBvaQamVZPkdJjEK1', 'HklCUKPtoD7xqi5SydpzGBxTnIL1tsIxMdr9pI26Q8FfUeLJE80eMifz2MCiXpMquyZr2BP9gg7FY6Swm', 'mBYQhshBfowyxxw0DF', 'v0fl2bSQlrkwGParpN', '_0oISgafl1pHFtQOk9c', 'VFkzUzAnj429d1yALh', 'cKM0CQlApexIk8yDHx', 'wHzUyYnhv4EPtZktOH'
            Source: eternal.exe, iQddWXbGwScqaHBkFEbMdof0OJRNz6u4WQnCKQbCS74w3fx02XLpJaDmKNJJPrSVG2hzVLqa8pl1ZFhxjBtSfLKqOzinxt5zUPR.csHigh entropy of concatenated method names: 'rWgDNtD9XClx2ePX1ClUNtaUKXAVpqLIPamcaShgPjX2GXhFnNddcug1dnCUVYeOGwlDB6awhp2LkVuNJqgnwhfzwZjoQTdYyJG', 'o4DruXGjL07o2HIFSRdU1PNswHXNNiP4YoTvKJjE1DPXeiunlYhlqIeliXadQH1QXJgcgn6jIzq13184TVW4yyI4fojGlGN86m3', '_15xvhav5CsVbhcaBatgprc9bhSzTJ2Uj711MIImyF1pfHIQjLdp07HnJ6Q9SOa16zKy7DsQpO2JWsPV7aDbHYdZ9PtIwNdYGFOd', 'ilP62xKpQqTx9U2gHfS6thNHObDbYplWekVrvTfo6xzmjbv8zdAIZrapg5YqVmvuy9ANsaQ0gu716iUEjF66cZiDs1qBN0Z8sFX', '_1L4pbsWDZhKfHZBBMpDwYw8KMuVu0BHVfRoCyfa35ApP31Z07D2DM4tFjH8jSVYQ9cOiCebiaAyTg20NpIeGtPKSRB8UwLiaqJT', '_0iQVfid5km9BaIMjdJ7jvr4wgk63gqvsqAq9Cv3kDD3NTRPAeUNHUqCLeRLZcYxPwS5AFnpc0guTCN7dVAqvD7i8KE5MAiBWpEC', 'F8JSf8qjcOEGjxHWRDmywmiPNV7vP3RrfeN2DwhBNngzTla9b4eZlM2atVYZ5NqxOn9LEJk8fYy3AAZa8cNBZf5CRMGD8l0dYIO', 'WWdZkn7NhLGtutIFzAPRtfYm50evObQXhtDpar21v', 'twLqMQQuRzHiNTomU0HgBk9BDJiIXnidwc25S9R7S', 'jYqvBynZ9drCFVMYmQPpIj8VpTcr4G6PjM7ybOXXz'
            Source: XClient.exe.0.dr, PNTkHhRdRADo9Htu8dbFVLGTwqCu2qbzjYH5zYlur5KxgSz1jQZuw8evWYvsSGwZnSHAYTXqL6hUBfvaIp2CoAMx26V.csHigh entropy of concatenated method names: '_0c5osAYdBH9XJ94w4zO6l972AlhrdGad0hqnAFgCFDwSXcziYUz2q1XXqL3Zde5p35YLYKckiT7zmCnBswlBhvyUlKO', 'zTL2B64wg2rWQWqASrnYspHnl0Z1Aumla4SUxs4D64pQI2WON1JnzP1oGkeyMwLMnb0f8QieLG4h', 'rkr0zO6T26LPtwV3U9c2u5xYBuctzMPqkJXb8TIBxlUKlPIg8rAaiHfjLP71Hzw255mMcNkH7LQq', 'Btv4maALwmARX', 'HJNgJkbLwyzIr', 'EHT5RPoBsAnvY', 'U5FhaAIW2Nj2K', '_7zTNkjNQ0QD3c', 'hQgK5oM9YmxrQ', 'LnSuQAe3DhXZ2'
            Source: XClient.exe.0.dr, ehFF3g5JMWmvPBY7f8PHXvmxPU1QBWGhSW9HZi8z2cL2PB9AU.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'Ea65l0P6VLiuAGdcSTuvjZVcwJgbGY1253l4vMwdSVADH492dX4PnHlSS35V2YM5c6dN3ZqKdkec', 'kOmiM1AbuLNjuLBf89wLzzjhN1Q3cqGGQEB6xJwPBYbBFOr4CSGH78YstQzx2itJcGbuOsGxLZKK', 'xGK7vCJFSYRW1gcvS6EUjMnJRR8OBcSkO5EdL9avx0j551WfeEgaTLxv1eSH4wQTZWjFIcRo4bUj', 'ERiYjJBn6pFxsGNYLGgy8QzMDp73EOBHgudvczYH3MSATieVEHc6hvYTbAy3glIC6sE2LzEEvOMf'
            Source: XClient.exe.0.dr, ZTVYtJFrmsQJQ9ljOwNBcyaFo9DitMyOY4oipU4ny.csHigh entropy of concatenated method names: 'NoCle4xZmufxswDeh5fhpTUgoSAb5eavmQrRgKskO', 'zZWCPg3bEKG534TZwNRhlqsIneV7P6FWDiwU', '_2yRRy4y5sBKarxi31GYBsSZgy2BbH10JSslb', 'f9J0BO2UoDn7uyJSkFmSMqD2U0CLAbQJIjKF', 'jF9RGodWK3s5qoVwiawclr9bGbBnIk6BZnQH'
            Source: XClient.exe.0.dr, IsDp1ecpTFNA4aR1tkuj7x6jBnVeFOWVVQprEerK5JT5WDvVxJvOqcheXfyHjH2HvZRfEKvHfLNgLVkvs.csHigh entropy of concatenated method names: 'k06g0iCbZCrfysspSRMUJhlvYv79m1SSzswTsLBuX8Uz3rCOToqYxOxgf2zC01crRWspIvgXQ8oEiE7TM', '_7zpgzbS6PiDyDJENNtstPc6AcDWETdl9qa8VBBfjip0JV0wNKaiUYqCSDNhWBNrFA2q5hZsTYIrwXV9eo', 'efanD038HcFIAEn81JcePjTZcmuYEb18URcxTmSvOhAn2vjbQL2CvMLKx5U8ELzWTMGmNEUgxjPFbQEUH', 'S6TBniyDwO1QE4SgIJD32eq9ggNzFjSC7eVHzx0pqJHhS5zDr1NKfdFiZ950zBN5SCgKu9PCd5pNKgRd4', '_5NB66cSsdfZl1wYpuBTFxnfbtIFkKthngYBP7aJYPI8h0KaVs8ob5oRSiwXQ0WpBTp3oQYyd9hCBeebIi', '_8auKXwrMjrWK6GETcQFbdg3Vp79uUUIPDb9Sy4WFo66QIUaj0mFhsh0uP1EDWfjJPZhOohG04ClP6EwKU', 'eZLULBsWHjkkBfq6UUkYqvjdfep7gP0Jsax6nfq8yPBu0kvptOtgeoAB89ekjARl0orRbLzx8vIrJJNzz', 'Uqe2k6rcLSu5PX1j4tOqUiz3AsHedfpnumnQKYbU0ZFOajGepCrXgVlcsAJjGLiJ3YS24bwh0hfa1TXHx', 'fPrS3IoE8AU3qNIg9y0bwAv5b2OwoCgc90vr3Dv9sCQsynP59RPumSLyr7wt2Q86BBiUuUlWpbuS75vgr', '_1bidLvfGyo8kT6sraMlH8OWiBDlbh3JTvPbdsjQ5ks4b8uEikoXH93LqXuA3XXmZXSrsBs1I2EenFSSKB'
            Source: XClient.exe.0.dr, 07Cdq7Slaf2T0jZczBuwyUXHac.csHigh entropy of concatenated method names: 'aNTMw6Lu16q3XeWHR1sR3PMWSc', '_85n0wGBYXzEAGGt4l8PGE0RDXu', 'CTQ4WASzc8s72DCU4qjXS0CXRl', 'Pc3Yhm8jNS8GFjGCj9zEGX6vS0', '_4SJw3T4IWGV1RB84xPDOcTwCH0BWzCDx7Cv9O75zcJBpdLzVGT2sJz', 'V7c4x1ZactwY6IDS1gx8EozmV7NQKodI3NEVUIzH9cdwub65IquqG5', 'tSoF4ErRLVczkRNY4oAHQYpg18er1hxx2JuiJvKNPus0RjONzUM9Ty', 'cReP19Usgw2ijL8SFqsFgwdEKNtvIYJq2VudLBTLJe7lL7ul2XGIKU', 'KrU1gipWTZPHUOXxkvD6LuPOmDsvj4AojcsA06vZMleEQghmaWD9sW15aZKDoJY72JOLWqRzXCo68c64eXudEf', 'w2J7OZ6KgMoKAlYfNB0Zamm0AZZpzVfIOcLbbErEWdfgG9fasIJXDTSSjeekkiQQ54pP4m3ld4E0FbrPz2HFkh'
            Source: XClient.exe.0.dr, fHfgyTqtDDXlgFY83FcOCVN0lmCsgZzHJUE3KRMC6.csHigh entropy of concatenated method names: 'eZmacRaUJwyo2V4YVB3fpVPcLirYMs9NgnkwDjFGp', 'd85CNq0UL5V9VHkpmg49vGPNv2eivxNFlfn6SA8Wa', 'aaPTnTrt8Ym4okXALJ8ARVYV41jgbEBIV1xhS5jpX', 'TipMraploFbtSJXkrL2wl7mQA2', '_8kYnfx2Lev1BuxUf3rf6rrRChf', 'YZm91ip80fd4eMng8qFrdBzNCg', 'IVWmqzIBjqA6oT2vjG5RkSmRor', 'Pr3QotefBmeLPnEJGZAv75JZ0Z', 'UxwYolw5crzg8rmsMOEamrwCXu', 'Sy558Qu3s6mdrFllG7ujEwVbsF'
            Source: XClient.exe.0.dr, z7GL3GcSz0bU9xxBylPHvbaUX8.csHigh entropy of concatenated method names: 'rczOseSIc2vnwuEKIR8PkcLmQa', '_04nQsc5SubxMuXJO3AjPmX0xdl', 'hFjVWq8dAgGwLNBrQoIeKlZxVQ', 'HcqlO99QRe4SHd8BzMhTs7NGM5', 'l7FpTzsY57NomzQ8RfXN2HkWPh', 'PPwLymJlD5IyaA6OX8oJLKE2eo', 'j0lPXeA3krUBU4eIKwHZCHQo8t', 'JF3URgxYwq9OQvJS00u8hCO5H8vqmWwDRbmYItsSowCm6gCXAbEsZZZmIQL', 'nwctXyVSHKGY5OLwe9fqeakonwIxFSDgOXORZzO0z6k9imOZ8ltZE3IN43d', 'yRMsRhBMjHLebAC07aypKk8Xvd0Fr7wd5MRrNJbh59gRGeUCPCNh0DRN0FX'
            Source: XClient.exe.0.dr, pwLyC8IGS9fWPw8AOOpq13VTDw.csHigh entropy of concatenated method names: 'q75ROLrqqHV6EmJDp91TOI4VmT', 'ZtBBrD6v9t5iKcxfvJFaw3H4IuoDdY5nuT9puJXpLcjL76IDfgCpHRRBmpJVtKBkLCrPDQOodEZjpRwSz7URN3', 'vfjRU45nEBY3auUaODMgdMoHtc4K9VQz4xOTtGT5Rs8N0nXwNGPIEGNdyM7MGhG3uPvvrFFxSVofALVPdeAZNJ', 'icSHmmvwaVgso4j8Hv3S4II3minVb10MWs5SQ63NpOLDYpHqrGopkznqOvYHFNLP1M4QnYgENy3C06mTgfD2bh', 'dpGjJ3p87EOacCY2vM0V24nVRlbrIREh0oXDjE2lWXatKNNzmuZcRV5SWjWaJ4VPQdH04vzaLiesjPJ7syopT7'
            Source: XClient.exe.0.dr, YQhejhVgT0ttgMOLyMJxgFpqD9cch4ZRZCw8NY2M6T1GDPhoPLEM2UjD1FgvZhc5VommPhvhtQvJWFL27.csHigh entropy of concatenated method names: 'v2ZikujqPLr1n6uIoVRgCl1pTavRWrBtjGZIRMgHAOgEZQHb0xl2UCVnjLOjvu4tr2gJgE8b2IxKZqqDE', 'Te60wYfmJ74mvSBCHY9Q1NYDhkeXswsJzyOxyUzGodjeG1TZQE5uz4gUMoPwHqZv0IL8rkrclqK6sLhXa', 'lOttlYb7JhxgqWLTIpZwgApjN4IiY5lALQP1k3zDtevLeLQ0arZpIFqdSuNqZ8CtJBvaQamVZPkdJjEK1', 'HklCUKPtoD7xqi5SydpzGBxTnIL1tsIxMdr9pI26Q8FfUeLJE80eMifz2MCiXpMquyZr2BP9gg7FY6Swm', 'mBYQhshBfowyxxw0DF', 'v0fl2bSQlrkwGParpN', '_0oISgafl1pHFtQOk9c', 'VFkzUzAnj429d1yALh', 'cKM0CQlApexIk8yDHx', 'wHzUyYnhv4EPtZktOH'
            Source: XClient.exe.0.dr, iQddWXbGwScqaHBkFEbMdof0OJRNz6u4WQnCKQbCS74w3fx02XLpJaDmKNJJPrSVG2hzVLqa8pl1ZFhxjBtSfLKqOzinxt5zUPR.csHigh entropy of concatenated method names: 'rWgDNtD9XClx2ePX1ClUNtaUKXAVpqLIPamcaShgPjX2GXhFnNddcug1dnCUVYeOGwlDB6awhp2LkVuNJqgnwhfzwZjoQTdYyJG', 'o4DruXGjL07o2HIFSRdU1PNswHXNNiP4YoTvKJjE1DPXeiunlYhlqIeliXadQH1QXJgcgn6jIzq13184TVW4yyI4fojGlGN86m3', '_15xvhav5CsVbhcaBatgprc9bhSzTJ2Uj711MIImyF1pfHIQjLdp07HnJ6Q9SOa16zKy7DsQpO2JWsPV7aDbHYdZ9PtIwNdYGFOd', 'ilP62xKpQqTx9U2gHfS6thNHObDbYplWekVrvTfo6xzmjbv8zdAIZrapg5YqVmvuy9ANsaQ0gu716iUEjF66cZiDs1qBN0Z8sFX', '_1L4pbsWDZhKfHZBBMpDwYw8KMuVu0BHVfRoCyfa35ApP31Z07D2DM4tFjH8jSVYQ9cOiCebiaAyTg20NpIeGtPKSRB8UwLiaqJT', '_0iQVfid5km9BaIMjdJ7jvr4wgk63gqvsqAq9Cv3kDD3NTRPAeUNHUqCLeRLZcYxPwS5AFnpc0guTCN7dVAqvD7i8KE5MAiBWpEC', 'F8JSf8qjcOEGjxHWRDmywmiPNV7vP3RrfeN2DwhBNngzTla9b4eZlM2atVYZ5NqxOn9LEJk8fYy3AAZa8cNBZf5CRMGD8l0dYIO', 'WWdZkn7NhLGtutIFzAPRtfYm50evObQXhtDpar21v', 'twLqMQQuRzHiNTomU0HgBk9BDJiIXnidwc25S9R7S', 'jYqvBynZ9drCFVMYmQPpIj8VpTcr4G6PjM7ybOXXz'
            Source: C:\Users\user\Desktop\eternal.exeFile created: C:\Users\user\AppData\Roaming\XClient.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\eternal.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\user\AppData\Roaming\XClient.exe"
            Source: C:\Users\user\Desktop\eternal.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnkJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnkJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run XClientJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run XClientJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\eternal.exeMemory allocated: 1370000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeMemory allocated: 1B160000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeMemory allocated: 23A0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeMemory allocated: 1A720000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeMemory allocated: 1500000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeMemory allocated: 1B180000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeMemory allocated: 1350000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeMemory allocated: 1ADD0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeMemory allocated: 1510000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeMemory allocated: 1B2A0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeMemory allocated: 10A0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeMemory allocated: 1AFD0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeMemory allocated: 1210000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeMemory allocated: 1AE10000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeMemory allocated: 7A0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeMemory allocated: 1A370000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\eternal.exeWindow / User API: threadDelayed 3194Jump to behavior
            Source: C:\Users\user\Desktop\eternal.exeWindow / User API: threadDelayed 6661Jump to behavior
            Source: C:\Users\user\Desktop\eternal.exe TID: 5652Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exe TID: 6396Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exe TID: 3348Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exe TID: 2192Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exe TID: 1404Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exe TID: 4044Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exe TID: 4660Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exe TID: 4192Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\eternal.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: eternal.exe, 00000000.00000002.3797625290.000000001C100000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllX
            Source: eternal.exe, 00000000.00000002.3794478743.0000000001198000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: C:\Users\user\Desktop\eternal.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\user\AppData\Roaming\XClient.exe"Jump to behavior
            Source: C:\Users\user\Desktop\eternal.exeQueries volume information: C:\Users\user\Desktop\eternal.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeQueries volume information: C:\Users\user\AppData\Roaming\XClient.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeQueries volume information: C:\Users\user\AppData\Roaming\XClient.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeQueries volume information: C:\Users\user\AppData\Roaming\XClient.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeQueries volume information: C:\Users\user\AppData\Roaming\XClient.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeQueries volume information: C:\Users\user\AppData\Roaming\XClient.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeQueries volume information: C:\Users\user\AppData\Roaming\XClient.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeQueries volume information: C:\Users\user\AppData\Roaming\XClient.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\eternal.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: eternal.exe, 00000000.00000002.3797625290.000000001C197000.00000004.00000020.00020000.00000000.sdmp, eternal.exe, 00000000.00000002.3797625290.000000001C100000.00000004.00000020.00020000.00000000.sdmp, eternal.exe, 00000000.00000002.3794478743.000000000112C000.00000004.00000020.00020000.00000000.sdmp, eternal.exe, 00000000.00000002.3794478743.00000000011F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\Desktop\eternal.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: eternal.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.eternal.exe.d30000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1344837200.0000000000D32000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: eternal.exe PID: 1704, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\XClient.exe, type: DROPPED

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: eternal.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.eternal.exe.d30000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1344837200.0000000000D32000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: eternal.exe PID: 1704, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\XClient.exe, type: DROPPED
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
            Windows Management Instrumentation
            1
            Scheduled Task/Job
            11
            Process Injection
            1
            Masquerading
            OS Credential Dumping221
            Security Software Discovery
            Remote Services11
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Scheduled Task/Job
            21
            Registry Run Keys / Startup Folder
            1
            Scheduled Task/Job
            1
            Disable or Modify Tools
            LSASS Memory1
            Process Discovery
            Remote Desktop ProtocolData from Removable Media1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAt1
            DLL Side-Loading
            21
            Registry Run Keys / Startup Folder
            131
            Virtualization/Sandbox Evasion
            Security Account Manager131
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive1
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            DLL Side-Loading
            11
            Process Injection
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput Capture11
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets1
            File and Directory Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
            Obfuscated Files or Information
            Cached Domain Credentials13
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
            Software Packing
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            eternal.exe74%ReversingLabsByteCode-MSIL.Spyware.AsyncRAT
            eternal.exe67%VirustotalBrowse
            eternal.exe100%AviraTR/Spy.Gen
            eternal.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\XClient.exe100%AviraTR/Spy.Gen
            C:\Users\user\AppData\Roaming\XClient.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Roaming\XClient.exe74%ReversingLabsByteCode-MSIL.Spyware.AsyncRAT
            C:\Users\user\AppData\Roaming\XClient.exe67%VirustotalBrowse
            No Antivirus matches
            SourceDetectionScannerLabelLink
            171.39.242.20.in-addr.arpa0%VirustotalBrowse
            SourceDetectionScannerLabelLink
            147.185.221.230%Avira URL Cloudsafe
            147.185.221.2318%VirustotalBrowse
            NameIPActiveMaliciousAntivirus DetectionReputation
            s-part-0017.t-0009.t-msedge.net
            13.107.246.45
            truefalse
              high
              171.39.242.20.in-addr.arpa
              unknown
              unknownfalseunknown
              NameMaliciousAntivirus DetectionReputation
              147.185.221.23true
              • 18%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameeternal.exe, 00000000.00000002.3795426043.0000000003161000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                147.185.221.23
                unknownUnited States
                12087SALSGIVERUStrue
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1557108
                Start date and time:2024-11-17 11:21:09 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 7m 43s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:15
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:eternal.exe
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@11/4@1/1
                EGA Information:
                • Successful, ratio: 12.5%
                HCA Information:
                • Successful, ratio: 99%
                • Number of executed functions: 74
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Override analysis time to 240000 for current running targets taking high CPU consumption
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                • Execution Graph export aborted for target XClient.exe, PID 2052 because it is empty
                • Execution Graph export aborted for target XClient.exe, PID 3376 because it is empty
                • Execution Graph export aborted for target XClient.exe, PID 3668 because it is empty
                • Execution Graph export aborted for target XClient.exe, PID 4436 because it is empty
                • Execution Graph export aborted for target XClient.exe, PID 5552 because it is empty
                • Execution Graph export aborted for target XClient.exe, PID 5852 because it is empty
                • Execution Graph export aborted for target XClient.exe, PID 5984 because it is empty
                • Not all processes where analyzed, report is missing behavior information
                • Report size exceeded maximum capacity and may have missing behavior information.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                TimeTypeDescription
                05:22:14API Interceptor14687681x Sleep call for process: eternal.exe modified
                10:22:10Task SchedulerRun new task: XClient path: C:\Users\user\AppData\Roaming\XClient.exe
                10:22:12AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run XClient C:\Users\user\AppData\Roaming\XClient.exe
                10:22:21AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run XClient C:\Users\user\AppData\Roaming\XClient.exe
                10:22:29AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                147.185.221.23svchost.exeGet hashmaliciousUnknownBrowse
                  msedge_visual_render.exeGet hashmaliciousXWormBrowse
                    exe030.exeGet hashmaliciousXWormBrowse
                      pQm8Ci3Dov.exeGet hashmaliciousXWormBrowse
                        jkL96SLfWS.exeGet hashmaliciousXWormBrowse
                          xtrSvgqQEW.exeGet hashmaliciousXWormBrowse
                            7PRbdkCn03.exeGet hashmaliciousXWormBrowse
                              8Hd0ZExgJz.exeGet hashmaliciousBlank Grabber, Umbral Stealer, XWormBrowse
                                6qwSgLbPO9.exeGet hashmaliciousXWormBrowse
                                  RLesaPFXew.exeGet hashmaliciousSilverRatBrowse
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    s-part-0017.t-0009.t-msedge.netLauncherPred8.3.37Stablesetup.msiGet hashmaliciousRemcosBrowse
                                    • 13.107.246.45
                                    file.exeGet hashmaliciousLummaCBrowse
                                    • 13.107.246.45
                                    file.exeGet hashmaliciousLummaCBrowse
                                    • 13.107.246.45
                                    file.exeGet hashmaliciousLummaCBrowse
                                    • 13.107.246.45
                                    file.exeGet hashmaliciousLummaCBrowse
                                    • 13.107.246.45
                                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                                    • 13.107.246.45
                                    file.exeGet hashmaliciousLummaCBrowse
                                    • 13.107.246.45
                                    jM0HEXs5mI.exe__.exeGet hashmaliciousLummaCBrowse
                                    • 13.107.246.45
                                    file.exeGet hashmaliciousLummaCBrowse
                                    • 13.107.246.45
                                    file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                    • 13.107.246.45
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    SALSGIVERUSsvchost.exeGet hashmaliciousUnknownBrowse
                                    • 147.185.221.23
                                    msedge_visual_render.exeGet hashmaliciousXWormBrowse
                                    • 147.185.221.23
                                    exe030.exeGet hashmaliciousXWormBrowse
                                    • 147.185.221.23
                                    pQm8Ci3Dov.exeGet hashmaliciousXWormBrowse
                                    • 147.185.221.23
                                    jkL96SLfWS.exeGet hashmaliciousXWormBrowse
                                    • 147.185.221.23
                                    xtrSvgqQEW.exeGet hashmaliciousXWormBrowse
                                    • 147.185.221.23
                                    7PRbdkCn03.exeGet hashmaliciousXWormBrowse
                                    • 147.185.221.23
                                    8Hd0ZExgJz.exeGet hashmaliciousBlank Grabber, Umbral Stealer, XWormBrowse
                                    • 147.185.221.23
                                    6qwSgLbPO9.exeGet hashmaliciousXWormBrowse
                                    • 147.185.221.23
                                    RLesaPFXew.exeGet hashmaliciousSilverRatBrowse
                                    • 147.185.221.23
                                    No context
                                    No context
                                    Process:C:\Users\user\AppData\Roaming\XClient.exe
                                    File Type:CSV text
                                    Category:dropped
                                    Size (bytes):654
                                    Entropy (8bit):5.380476433908377
                                    Encrypted:false
                                    SSDEEP:12:Q3La/KDLI4MWuPXcp1OKbbDLI4MWuPOKfSSI6Khap+92n4MNQp3/VXM5gXu9tv:ML9E4KQwKDE4KGKZI6Kh6+84xp3/VclT
                                    MD5:30E4BDFC34907D0E4D11152CAEBE27FA
                                    SHA1:825402D6B151041BA01C5117387228EC9B7168BF
                                    SHA-256:A7B8F7FFB4822570DB1423D61ED74D7F4B538CE73521CC8745BC6B131C18BE63
                                    SHA-512:89FBCBCDB0BE5AD7A95685CF9AA4330D5B0250440E67DC40C6642260E024F52A402E9381F534A9824D2541B98B02094178A15BF2320148432EDB0D09B5F972BA
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\04de61553901f06e2f763b6f03a6f65a\Microsoft.VisualBasic.ni.dll",0..
                                    Process:C:\Users\user\Desktop\eternal.exe
                                    File Type:Generic INItialization configuration [WIN]
                                    Category:dropped
                                    Size (bytes):64
                                    Entropy (8bit):3.6722687970803873
                                    Encrypted:false
                                    SSDEEP:3:rRSFYJKXzovNsr42VjFYJKXzovuEXn:EFYJKDoWr5FYJKDoG+n
                                    MD5:DE63D53293EBACE29F3F54832D739D40
                                    SHA1:1BC3FEF699C3C2BB7B9A9D63C7E60381263EDA7F
                                    SHA-256:A86BA2FC02725E4D97799A622EB68BF2FCC6167D439484624FA2666468BBFB1B
                                    SHA-512:10AB83C81F572DBAA99441D2BFD8EC5FF1C4BA84256ACDBD24FEB30A33498B689713EBF767500DAAAD6D188A3B9DC970CF858A6896F4381CEAC1F6A74E1603D0
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview:....### explorer ###..[WIN]r[WIN]....### explorer ###..r[WIN]r
                                    Process:C:\Users\user\Desktop\eternal.exe
                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sun Nov 17 09:22:07 2024, mtime=Sun Nov 17 09:22:07 2024, atime=Sun Nov 17 09:22:07 2024, length=71168, window=hide
                                    Category:dropped
                                    Size (bytes):763
                                    Entropy (8bit):5.065002293325832
                                    Encrypted:false
                                    SSDEEP:12:8xb24o29l4l0tChXyedY//YtKlMLKR8Zg8YjAx8qwNHkfAd4mV:8h54uQyZs1KRSZ8ApwCfAd4m
                                    MD5:658F6EA7BDB3F35432C50960E717A0BD
                                    SHA1:7E3C4314060B6D94BBEC5228371317956B90FC9D
                                    SHA-256:EF097BC62E934524156C9DE685B65DB7DF6D9CF68C7B676A25FF26B8F8D394B8
                                    SHA-512:B7B6967AEA9089A78D83B14BB1B5FC66DA98FF4AF087D68DA1D2D3FE5A3CDFBC79652128AFEE65051FA5408FAF3B27A5736B12DAD862D0B91150890136E99CC2
                                    Malicious:false
                                    Reputation:low
                                    Preview:L..................F.... ....8..8...8..8...8..8..........................v.:..DG..Yr?.D..U..k0.&...&.......bBDj...<.Y..8.._$...8......t...CFSF..1.....EWsG..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EWsGqY.R..........................=...A.p.p.D.a.t.a...B.V.1.....qY.R..Roaming.@......EWsGqY.R..........................N...R.o.a.m.i.n.g.....b.2.....qY.R .XClient.exe.H......qY.RqY.R....A.......................#.X.C.l.i.e.n.t...e.x.e.......X...............-.......W...........{........C:\Users\user\AppData\Roaming\XClient.exe........\.....\.....\.....\.....\.X.C.l.i.e.n.t...e.x.e.`.......X.......965543...........hT..CrF.f4... .a.E._c...,...E...hT..CrF.f4... .a.E._c...,...E..E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                    Process:C:\Users\user\Desktop\eternal.exe
                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Category:dropped
                                    Size (bytes):71168
                                    Entropy (8bit):6.026372989128195
                                    Encrypted:false
                                    SSDEEP:1536:dEmkVu+xslqytUTZfJM6htYxrlYCbM1/kCxtD6LOSIcRGPUC:dEZZx8q/fJLtYFZbM1segO3cQ8C
                                    MD5:7439CC991A9A756C41153B8E9121BAAB
                                    SHA1:C62528386E5F62FF2975CC8ED0CAD3A7D362E632
                                    SHA-256:31A2B821E933BB193D94438D4A5AA036519535336C936D65B66889FB03164E2D
                                    SHA-512:CBDFD77671884407F8F4BD9C5251DF5D8896B29BD004EA52460EDA8A222DF7492C69572E044376315624220F3EA66DE3AFF34323EA281591CA2975F90FA6DD51
                                    Malicious:true
                                    Yara Hits:
                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Roaming\XClient.exe, Author: Joe Security
                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Roaming\XClient.exe, Author: ditekSHen
                                    Antivirus:
                                    • Antivirus: Avira, Detection: 100%
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    • Antivirus: ReversingLabs, Detection: 74%
                                    • Antivirus: Virustotal, Detection: 67%, Browse
                                    Reputation:low
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....g.............................+... ...@....@.. ....................................@.................................P+..K....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................+......H.......0^.. .......&.....................................................(....*.r...p*. .x!.*..(....*.r...p*. ....*.s.........s.........s.........s.........*.r7..p*. .O..*.r...p*.rm..p*. ....*.r...p*. .&..*.r...p*. ....*..((...*.r...p*. .A..*.r...p*. E/..*"(....+.*&(....&+.*.+5sT... .... .'..oU...(,...~....-.(D...(6...~....oV...&.-.*.r...p*. *p{.*.r...p*. ^...*.r...p*. ....*.r...p*.r1..p*. t...*..............j..................sW..............*"(F...+.*:.t....(A...+.*.r]..p*
                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):6.026372989128195
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Windows Screen Saver (13104/52) 0.07%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    File name:eternal.exe
                                    File size:71'168 bytes
                                    MD5:7439cc991a9a756c41153b8e9121baab
                                    SHA1:c62528386e5f62ff2975cc8ed0cad3a7d362e632
                                    SHA256:31a2b821e933bb193d94438d4a5aa036519535336c936d65b66889fb03164e2d
                                    SHA512:cbdfd77671884407f8f4bd9c5251df5d8896b29bd004ea52460eda8a222df7492c69572e044376315624220f3ea66de3aff34323ea281591ca2975f90fa6dd51
                                    SSDEEP:1536:dEmkVu+xslqytUTZfJM6htYxrlYCbM1/kCxtD6LOSIcRGPUC:dEZZx8q/fJLtYFZbM1segO3cQ8C
                                    TLSH:20638D4C7BE74520E2FF9FB148F63252D679F3135903A69F28DA01872723A84CD856E9
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.............................+... ...@....@.. ....................................@................................
                                    Icon Hash:00928e8e8686b000
                                    Entrypoint:0x412b9e
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x671B84E5 [Fri Oct 25 11:45:41 2024 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x12b500x4b.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x140000x4ce.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x160000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000x10ba40x10c009aff27ecbadfeb0a78281dbd0f964ac3False0.6075093283582089data6.102940639221671IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rsrc0x140000x4ce0x600e91ee91db1d305f2e462e5d554e484deFalse0.37109375data3.713953333125255IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x160000xc0x20001a0961a443f53381b26bcd7ce5c031fFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_VERSION0x140a00x244data0.46379310344827585
                                    RT_MANIFEST0x142e40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                    2024-11-17T11:23:22.207179+01002855924ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.953547147.185.221.2333942TCP
                                    2024-11-17T11:25:11.545747+01002853193ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.953557147.185.221.2333942TCP
                                    TimestampSource PortDest PortSource IPDest IP
                                    Nov 17, 2024 11:22:14.306544065 CET4977733942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:22:14.312220097 CET3394249777147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:22:14.312386036 CET4977733942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:22:15.073494911 CET4977733942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:22:15.078383923 CET3394249777147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:22:22.797616959 CET3394249777147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:22:22.798100948 CET4977733942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:22:24.967272997 CET4977733942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:22:24.969521999 CET4984033942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:22:24.973479986 CET3394249777147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:22:24.975192070 CET3394249840147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:22:24.975347042 CET4984033942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:22:24.993285894 CET4984033942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:22:24.998255968 CET3394249840147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:22:33.460237980 CET3394249840147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:22:33.460366011 CET4984033942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:22:36.186054945 CET4984033942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:22:36.187156916 CET5345933942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:22:36.191185951 CET3394249840147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:22:36.192116976 CET3394253459147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:22:36.192315102 CET5345933942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:22:36.209115028 CET5345933942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:22:36.214206934 CET3394253459147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:22:44.674947977 CET3394253459147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:22:44.675018072 CET5345933942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:22:44.951504946 CET5345933942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:22:44.952296972 CET5351233942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:22:44.956341028 CET3394253459147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:22:44.957154036 CET3394253512147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:22:44.957340002 CET5351233942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:22:44.971877098 CET5351233942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:22:44.978244066 CET3394253512147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:22:53.439743996 CET3394253512147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:22:53.439832926 CET5351233942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:22:54.498514891 CET5351233942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:22:54.499336958 CET5354433942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:22:54.503464937 CET3394253512147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:22:54.504259109 CET3394253544147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:22:54.504379034 CET5354433942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:22:54.520925999 CET5354433942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:22:54.526011944 CET3394253544147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:02.996341944 CET3394253544147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:02.996432066 CET5354433942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:04.515600920 CET5354433942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:04.517309904 CET5354533942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:04.520653963 CET3394253544147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:04.522211075 CET3394253545147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:04.522367001 CET5354533942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:04.538077116 CET5354533942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:04.542916059 CET3394253545147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:12.998028040 CET3394253545147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:12.998163939 CET5354533942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:13.014098883 CET5354533942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:13.014861107 CET5354633942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:13.018970966 CET3394253545147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:13.019784927 CET3394253546147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:13.019857883 CET5354633942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:13.034872055 CET5354633942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:13.039777040 CET3394253546147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:21.494205952 CET3394253546147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:21.494492054 CET5354633942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:22.126723051 CET5354633942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:22.129563093 CET5354733942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:22.131582975 CET3394253546147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:22.134495020 CET3394253547147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:22.134594917 CET5354733942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:22.182777882 CET5354733942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:22.187653065 CET3394253547147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:22.207179070 CET5354733942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:22.212233067 CET3394253547147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:22.358056068 CET5354733942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:22.362968922 CET3394253547147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:27.576977968 CET5354733942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:27.581842899 CET3394253547147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:27.592355967 CET5354733942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:27.597342014 CET3394253547147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:27.623641968 CET5354733942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:27.628659964 CET3394253547147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:27.639524937 CET5354733942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:27.644432068 CET3394253547147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:27.670571089 CET5354733942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:27.675692081 CET3394253547147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:27.795458078 CET5354733942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:27.800385952 CET3394253547147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:27.810986996 CET5354733942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:27.815905094 CET3394253547147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:30.618772984 CET3394253547147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:30.619612932 CET5354733942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:32.826874971 CET5354733942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:32.829152107 CET5354833942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:32.831814051 CET3394253547147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:32.834110975 CET3394253548147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:32.834897995 CET5354833942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:33.017402887 CET5354833942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:33.022316933 CET3394253548147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:38.123615980 CET5354833942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:38.128537893 CET3394253548147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:38.155030012 CET5354833942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:38.160152912 CET3394253548147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:38.264146090 CET5354833942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:38.269020081 CET3394253548147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:41.323755026 CET3394253548147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:41.324130058 CET5354833942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:43.264122009 CET5354833942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:43.267472982 CET5354933942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:43.269105911 CET3394253548147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:43.272402048 CET3394253549147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:43.275669098 CET5354933942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:43.529700994 CET5354933942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:43.534698963 CET3394253549147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:43.561275959 CET5354933942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:43.566236019 CET3394253549147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:43.592427969 CET5354933942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:43.597942114 CET3394253549147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:43.607958078 CET5354933942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:43.612814903 CET3394253549147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:43.670516014 CET5354933942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:43.675472975 CET3394253549147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:43.686083078 CET5354933942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:43.691581964 CET3394253549147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:43.717365026 CET5354933942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:43.722178936 CET3394253549147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:44.014257908 CET5354933942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:44.019228935 CET3394253549147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:47.328464985 CET5354933942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:47.333241940 CET3394253549147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:51.763742924 CET3394253549147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:51.763797998 CET5354933942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:53.779927015 CET5354933942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:53.781316042 CET5355033942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:53.784925938 CET3394253549147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:53.786175013 CET3394253550147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:53.786242008 CET5355033942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:53.825335979 CET5355033942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:53.830122948 CET3394253550147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:53.873945951 CET5355033942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:53.878819942 CET3394253550147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:53.920471907 CET5355033942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:53.925339937 CET3394253550147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:53.936451912 CET5355033942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:53.941561937 CET3394253550147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:59.233510017 CET5355033942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:59.238495111 CET3394253550147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:59.545475006 CET5355033942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:59.550364971 CET3394253550147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:59.702117920 CET5355033942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:59.707250118 CET3394253550147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:59.764657021 CET5355033942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:59.769531965 CET3394253550147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:59.826818943 CET5355033942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:59.831809998 CET3394253550147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:59.858330011 CET5355033942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:59.863378048 CET3394253550147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:59.873650074 CET5355033942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:59.878570080 CET3394253550147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:59.889199972 CET5355033942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:59.894131899 CET3394253550147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:59.936228037 CET5355033942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:59.941097975 CET3394253550147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:59.951832056 CET5355033942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:59.956717014 CET3394253550147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:23:59.967616081 CET5355033942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:23:59.972687960 CET3394253550147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:02.269627094 CET3394253550147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:02.269707918 CET5355033942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:05.045398951 CET5355033942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:05.047297955 CET5355133942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:05.050743103 CET3394253550147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:05.052381039 CET3394253551147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:05.052449942 CET5355133942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:05.136365891 CET5355133942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:05.141376019 CET3394253551147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:13.533651114 CET3394253551147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:13.537636042 CET5355133942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:15.670459986 CET5355133942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:15.672044992 CET5355233942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:15.675632954 CET3394253551147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:15.676985025 CET3394253552147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:15.677109957 CET5355233942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:15.722461939 CET5355233942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:15.727488995 CET3394253552147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:21.780169964 CET5355233942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:21.785089016 CET3394253552147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:24.159003019 CET3394253552147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:24.159071922 CET5355233942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:25.964016914 CET5355233942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:25.964711905 CET5355333942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:25.969013929 CET3394253552147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:25.969554901 CET3394253553147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:25.969636917 CET5355333942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:26.300514936 CET5355333942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:26.501384020 CET3394253553147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:26.501452923 CET5355333942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:26.506464005 CET3394253553147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:31.749497890 CET5355333942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:31.755470991 CET3394253553147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:32.717514038 CET5355333942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:32.722439051 CET3394253553147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:34.450038910 CET3394253553147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:34.453638077 CET5355333942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:36.889271975 CET5355333942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:36.891885042 CET5355433942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:36.895294905 CET3394253553147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:36.897757053 CET3394253554147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:36.897835970 CET5355433942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:36.935715914 CET5355433942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:36.940515995 CET3394253554147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:36.951762915 CET5355433942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:36.956559896 CET3394253554147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:36.998775005 CET5355433942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:37.004861116 CET3394253554147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:41.045630932 CET5355433942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:41.050705910 CET3394253554147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:45.384151936 CET3394253554147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:45.384213924 CET5355433942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:47.092281103 CET5355433942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:47.094209909 CET5355533942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:47.097186089 CET3394253554147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:47.099025965 CET3394253555147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:47.099132061 CET5355533942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:47.134474039 CET5355533942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:47.139398098 CET3394253555147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:47.154920101 CET5355533942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:47.159801006 CET3394253555147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:49.108102083 CET5355533942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:49.113042116 CET3394253555147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:50.749135017 CET5355533942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:50.754084110 CET3394253555147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:52.361615896 CET5355533942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:52.366554976 CET3394253555147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:55.583954096 CET3394253555147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:55.584022045 CET5355533942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:57.529876947 CET5355533942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:57.531627893 CET5355633942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:57.535051107 CET3394253555147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:57.536598921 CET3394253556147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:57.536654949 CET5355633942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:57.569431067 CET5355633942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:57.574382067 CET3394253556147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:57.623850107 CET5355633942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:57.628793001 CET3394253556147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:57.655008078 CET5355633942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:57.659915924 CET3394253556147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:57.670588970 CET5355633942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:57.675509930 CET3394253556147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:57.689547062 CET5355633942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:57.694437981 CET3394253556147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:57.889473915 CET5355633942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:57.894531965 CET3394253556147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:58.092529058 CET5355633942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:58.098254919 CET3394253556147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:24:58.373855114 CET5355633942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:24:58.378837109 CET3394253556147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:02.780158997 CET5355633942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:02.785259008 CET3394253556147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:02.795746088 CET5355633942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:02.800816059 CET3394253556147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:02.999233961 CET5355633942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:03.004684925 CET3394253556147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:03.030416965 CET5355633942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:03.035270929 CET3394253556147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:03.061523914 CET5355633942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:03.066420078 CET3394253556147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:03.139632940 CET5355633942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:03.144581079 CET3394253556147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:06.012341022 CET3394253556147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:06.012563944 CET5355633942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:08.186081886 CET5355633942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:08.187702894 CET5355733942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:08.191328049 CET3394253556147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:08.192740917 CET3394253557147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:08.192835093 CET5355733942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:08.295337915 CET5355733942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:08.300652981 CET3394253557147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:11.498830080 CET5355733942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:11.504075050 CET3394253557147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:11.545747042 CET5355733942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:11.557959080 CET3394253557147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:13.452063084 CET5355733942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:13.457226992 CET3394253557147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:13.498850107 CET5355733942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:13.503858089 CET3394253557147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:13.514416933 CET5355733942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:13.519345045 CET3394253557147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:16.683743000 CET3394253557147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:16.685674906 CET5355733942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:18.516273022 CET5355733942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:18.516289949 CET5355833942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:18.521374941 CET3394253557147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:18.521384954 CET3394253558147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:18.521642923 CET5355833942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:18.737241983 CET5355833942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:18.742438078 CET3394253558147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:18.811502934 CET5355833942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:18.816800117 CET3394253558147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:18.842611074 CET5355833942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:18.847729921 CET3394253558147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:18.858289957 CET5355833942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:18.863203049 CET3394253558147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:18.889518023 CET5355833942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:18.894541025 CET3394253558147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:18.920718908 CET5355833942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:18.925823927 CET3394253558147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:18.967670918 CET5355833942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:18.972731113 CET3394253558147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:18.983217955 CET5355833942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:18.988106966 CET3394253558147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:26.952027082 CET5355833942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:26.957048893 CET3394253558147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:27.007468939 CET3394253558147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:27.007534981 CET5355833942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:29.030062914 CET5355833942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:29.032994986 CET5355933942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:29.041431904 CET3394253558147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:29.041456938 CET3394253559147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:29.041528940 CET5355933942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:29.075578928 CET5355933942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:29.080528021 CET3394253559147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:29.108345032 CET5355933942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:29.113346100 CET3394253559147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:29.123936892 CET5355933942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:29.128817081 CET3394253559147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:31.264502048 CET5355933942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:31.269673109 CET3394253559147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:31.327081919 CET5355933942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:31.332017899 CET3394253559147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:37.527848005 CET3394253559147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:37.527918100 CET5355933942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:39.346354961 CET5355933942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:39.351402044 CET3394253559147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:39.363243103 CET5356033942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:39.368155003 CET3394253560147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:39.368221045 CET5356033942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:39.498505116 CET5356033942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:39.503417969 CET3394253560147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:44.109733105 CET5356033942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:44.114686012 CET3394253560147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:45.249327898 CET5356033942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:45.592391968 CET5356033942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:46.036201954 CET3394253560147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:46.036254883 CET3394253560147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:47.859621048 CET3394253560147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:47.860059977 CET5356033942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:50.561358929 CET5356033942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:50.562611103 CET5356133942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:50.566457987 CET3394253560147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:50.567605019 CET3394253561147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:50.567742109 CET5356133942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:50.805915117 CET5356133942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:50.810882092 CET3394253561147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:53.577394009 CET5356133942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:53.582565069 CET3394253561147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:58.967638016 CET5356133942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:25:58.972621918 CET3394253561147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:59.063052893 CET3394253561147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:25:59.063194036 CET5356133942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:26:01.299829960 CET5356133942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:26:01.304474115 CET5356233942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:26:01.304760933 CET3394253561147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:26:01.309297085 CET3394253562147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:26:01.309492111 CET5356233942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:26:01.356651068 CET5356233942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:26:01.361450911 CET3394253562147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:26:06.844228983 CET5356233942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:26:06.849297047 CET3394253562147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:26:09.452192068 CET5356233942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:26:09.457282066 CET3394253562147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:26:09.789185047 CET3394253562147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:26:09.789293051 CET5356233942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:26:14.451872110 CET5356233942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:26:14.452675104 CET5356333942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:26:14.456742048 CET3394253562147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:26:14.457515955 CET3394253563147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:26:14.457624912 CET5356333942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:26:14.506797075 CET5356333942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:26:14.512823105 CET3394253563147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:26:22.933558941 CET3394253563147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:26:22.933696985 CET5356333942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:26:30.452090979 CET5356333942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:26:30.452593088 CET5356433942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:26:30.457240105 CET3394253563147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:26:30.457595110 CET3394253564147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:26:30.457669020 CET5356433942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:26:30.470352888 CET5356433942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:26:30.475205898 CET3394253564147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:26:38.938853025 CET3394253564147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:26:38.941874981 CET5356433942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:26:39.593184948 CET5356433942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:26:39.593559980 CET5356533942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:26:39.598440886 CET3394253564147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:26:39.598509073 CET3394253565147.185.221.23192.168.2.9
                                    Nov 17, 2024 11:26:39.598632097 CET5356533942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:26:39.609328985 CET5356533942192.168.2.9147.185.221.23
                                    Nov 17, 2024 11:26:39.614455938 CET3394253565147.185.221.23192.168.2.9
                                    TimestampSource PortDest PortSource IPDest IP
                                    Nov 17, 2024 11:22:34.974170923 CET5363285162.159.36.2192.168.2.9
                                    Nov 17, 2024 11:22:35.638308048 CET6415553192.168.2.91.1.1.1
                                    Nov 17, 2024 11:22:35.688406944 CET53641551.1.1.1192.168.2.9
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Nov 17, 2024 11:22:35.638308048 CET192.168.2.91.1.1.10x9694Standard query (0)171.39.242.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Nov 17, 2024 11:22:01.179646015 CET1.1.1.1192.168.2.90xb03No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                    Nov 17, 2024 11:22:01.179646015 CET1.1.1.1192.168.2.90xb03No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                    Nov 17, 2024 11:22:35.688406944 CET1.1.1.1192.168.2.90x9694Name error (3)171.39.242.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:05:22:03
                                    Start date:17/11/2024
                                    Path:C:\Users\user\Desktop\eternal.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Users\user\Desktop\eternal.exe"
                                    Imagebase:0xd30000
                                    File size:71'168 bytes
                                    MD5 hash:7439CC991A9A756C41153B8E9121BAAB
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000000.1344837200.0000000000D32000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000000.1344837200.0000000000D32000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                    Reputation:low
                                    Has exited:false

                                    Target ID:2
                                    Start time:05:22:08
                                    Start date:17/11/2024
                                    Path:C:\Windows\System32\schtasks.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\user\AppData\Roaming\XClient.exe"
                                    Imagebase:0x7ff70ea00000
                                    File size:235'008 bytes
                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:3
                                    Start time:05:22:08
                                    Start date:17/11/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff70f010000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:4
                                    Start time:05:22:10
                                    Start date:17/11/2024
                                    Path:C:\Users\user\AppData\Roaming\XClient.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Users\user\AppData\Roaming\XClient.exe
                                    Imagebase:0x4a0000
                                    File size:71'168 bytes
                                    MD5 hash:7439CC991A9A756C41153B8E9121BAAB
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Roaming\XClient.exe, Author: Joe Security
                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Roaming\XClient.exe, Author: ditekSHen
                                    Antivirus matches:
                                    • Detection: 100%, Avira
                                    • Detection: 100%, Joe Sandbox ML
                                    • Detection: 74%, ReversingLabs
                                    • Detection: 67%, Virustotal, Browse
                                    Reputation:low
                                    Has exited:true

                                    Target ID:6
                                    Start time:05:22:21
                                    Start date:17/11/2024
                                    Path:C:\Users\user\AppData\Roaming\XClient.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Users\user\AppData\Roaming\XClient.exe"
                                    Imagebase:0xdc0000
                                    File size:71'168 bytes
                                    MD5 hash:7439CC991A9A756C41153B8E9121BAAB
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Target ID:7
                                    Start time:05:22:29
                                    Start date:17/11/2024
                                    Path:C:\Users\user\AppData\Roaming\XClient.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Users\user\AppData\Roaming\XClient.exe"
                                    Imagebase:0xb00000
                                    File size:71'168 bytes
                                    MD5 hash:7439CC991A9A756C41153B8E9121BAAB
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Target ID:10
                                    Start time:05:23:01
                                    Start date:17/11/2024
                                    Path:C:\Users\user\AppData\Roaming\XClient.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Users\user\AppData\Roaming\XClient.exe
                                    Imagebase:0xfd0000
                                    File size:71'168 bytes
                                    MD5 hash:7439CC991A9A756C41153B8E9121BAAB
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Target ID:12
                                    Start time:05:24:00
                                    Start date:17/11/2024
                                    Path:C:\Users\user\AppData\Roaming\XClient.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Users\user\AppData\Roaming\XClient.exe
                                    Imagebase:0xc30000
                                    File size:71'168 bytes
                                    MD5 hash:7439CC991A9A756C41153B8E9121BAAB
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Target ID:13
                                    Start time:05:25:00
                                    Start date:17/11/2024
                                    Path:C:\Users\user\AppData\Roaming\XClient.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Users\user\AppData\Roaming\XClient.exe
                                    Imagebase:0x9c0000
                                    File size:71'168 bytes
                                    MD5 hash:7439CC991A9A756C41153B8E9121BAAB
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Target ID:14
                                    Start time:05:26:00
                                    Start date:17/11/2024
                                    Path:C:\Users\user\AppData\Roaming\XClient.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Users\user\AppData\Roaming\XClient.exe
                                    Imagebase:0x150000
                                    File size:71'168 bytes
                                    MD5 hash:7439CC991A9A756C41153B8E9121BAAB
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:18.2%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:27
                                      Total number of Limit Nodes:2
                                      execution_graph 4692 7ff887cf3c43 4693 7ff887cf3c52 4692->4693 4698 7ff887cf13c8 4693->4698 4695 7ff887cf4010 4696 7ff887cf13c8 RtlSetProcessIsCritical 4695->4696 4697 7ff887cf401f 4695->4697 4696->4697 4698->4695 4699 7ff887cf4ef0 4698->4699 4702 7ff887cf2ef8 4699->4702 4703 7ff887cf2f01 RtlSetProcessIsCritical 4702->4703 4705 7ff887cf2fc2 4703->4705 4705->4695 4706 7ff887cf44e0 4707 7ff887cf44e5 4706->4707 4708 7ff887cf2ef8 RtlSetProcessIsCritical 4707->4708 4709 7ff887cf4699 4707->4709 4708->4709 4710 7ff887cf4eae 4711 7ff887cf4ec2 4710->4711 4712 7ff887cf2ef8 RtlSetProcessIsCritical 4711->4712 4713 7ff887cf4f1c 4712->4713 4688 7ff887cf3408 4690 7ff887cf3411 SetWindowsHookExW 4688->4690 4691 7ff887cf34e1 4690->4691 4714 7ff887cf3d29 4715 7ff887cf3d49 4714->4715 4716 7ff887cf13c8 RtlSetProcessIsCritical 4715->4716 4717 7ff887cf4010 4716->4717 4718 7ff887cf13c8 RtlSetProcessIsCritical 4717->4718 4719 7ff887cf401f 4717->4719 4718->4719

                                      Control-flow Graph

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3798533512.00007FF887CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff887cf0000_eternal.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 6B$6B$6B$6B$"rB$0DL$0DL$0DL$8ML$CAO_^
                                      • API String ID: 0-295822469
                                      • Opcode ID: bedcde8625f8e4f77643bdd2d8954bcd5255e464ea994e66781873b3e74a711f
                                      • Instruction ID: 123d66fc37e22d7c80b6d1b89eeaafb68c451c381a492eb916fed0c641fa4da9
                                      • Opcode Fuzzy Hash: bedcde8625f8e4f77643bdd2d8954bcd5255e464ea994e66781873b3e74a711f
                                      • Instruction Fuzzy Hash: AB12B170B28A464BE798FB68C4657BD73E2FF98780F540579D40EC3296DE6CA8418742

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 631 7ff887cf2059-7ff887cf2065 632 7ff887cf2067 631->632 633 7ff887cf2068-7ff887cf2079 631->633 632->633 634 7ff887cf207c-7ff887cf208d 633->634 635 7ff887cf207b 633->635 636 7ff887cf2090-7ff887cf20a1 634->636 637 7ff887cf208f 634->637 635->634 638 7ff887cf20a4-7ff887cf20b5 636->638 639 7ff887cf20a3 636->639 637->636 640 7ff887cf20b7 638->640 641 7ff887cf20b8-7ff887cf20c9 638->641 639->638 640->641 642 7ff887cf20cc-7ff887cf21b0 641->642 643 7ff887cf20cb 641->643 657 7ff887cf21ba-7ff887cf21bb 642->657 643->642 658 7ff887cf21c2-7ff887cf21de 657->658 660 7ff887cf21e0-7ff887cf21e3 658->660 661 7ff887cf21ec-7ff887cf220f 660->661
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3798533512.00007FF887CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff887cf0000_eternal.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: r6B
                                      • API String ID: 0-2624010786
                                      • Opcode ID: 53b326d6a81ca391c3f443de1d05a0438a1c70b69c4d87ab89f2608d09d2a6f2
                                      • Instruction ID: 8315a83aa213787ac9ac32c43d8430bc69642341218a517111858a0731aba69e
                                      • Opcode Fuzzy Hash: 53b326d6a81ca391c3f443de1d05a0438a1c70b69c4d87ab89f2608d09d2a6f2
                                      • Instruction Fuzzy Hash: 6F510221A5D6C55FD796AB7898243797FE1EF8B255B0800FBE08DC71E3DE485846C342
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3798533512.00007FF887CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff887cf0000_eternal.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 46d8e464a121b93f0b97881bc8da6a542069f31e442d3cf273af0251142c853f
                                      • Instruction ID: 0ef0cef5f2d5a71e08bd8488747e0b130ad591b033d17611b35f5bd466d56059
                                      • Opcode Fuzzy Hash: 46d8e464a121b93f0b97881bc8da6a542069f31e442d3cf273af0251142c853f
                                      • Instruction Fuzzy Hash: E1F19230908A4D8FEFA8DF28D8557E977E2FF64350F04426AE84DC7291CB789945CB82
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3798533512.00007FF887CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff887cf0000_eternal.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c3f49dc37a2f4c75331fc697c441988c3a245528f00a8c8e5ae77a3432b69896
                                      • Instruction ID: d1d6b0a6e0153765cc7297cbfec61ac4d2fc5668636845c04b8b82111ee9636b
                                      • Opcode Fuzzy Hash: c3f49dc37a2f4c75331fc697c441988c3a245528f00a8c8e5ae77a3432b69896
                                      • Instruction Fuzzy Hash: 3CE19230908A4E8FEBA8DF28D8557ED77E2FF55350F14426AD84DC7291CB78A845CB82

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 559 7ff887cf3408-7ff887cf340f 560 7ff887cf3411-7ff887cf3419 559->560 561 7ff887cf341a-7ff887cf348d 559->561 560->561 565 7ff887cf3493-7ff887cf34a0 561->565 566 7ff887cf3519-7ff887cf351d 561->566 567 7ff887cf34a2-7ff887cf34df SetWindowsHookExW 565->567 566->567 569 7ff887cf34e7-7ff887cf3518 567->569 570 7ff887cf34e1 567->570 570->569
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3798533512.00007FF887CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff887cf0000_eternal.jbxd
                                      Similarity
                                      • API ID: HookWindows
                                      • String ID:
                                      • API String ID: 2559412058-0
                                      • Opcode ID: 976b1e18698037411fd0b6975edd15435279c2d12c7aa68868635eba5c0e7498
                                      • Instruction ID: 976ba2047feb750d2d9005b6f3f40aa9775b82f06581ce4cc9f6fec105ab4953
                                      • Opcode Fuzzy Hash: 976b1e18698037411fd0b6975edd15435279c2d12c7aa68868635eba5c0e7498
                                      • Instruction Fuzzy Hash: 3D41F43190CA595FDB18EB58D8466FDBBE1EB59321F00423ED00DC3292CA64A802C7C1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 573 7ff887cf2ef8-7ff887cf2fc0 RtlSetProcessIsCritical 578 7ff887cf2fc2 573->578 579 7ff887cf2fc8-7ff887cf2ffd 573->579 578->579
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3798533512.00007FF887CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff887cf0000_eternal.jbxd
                                      Similarity
                                      • API ID: CriticalProcess
                                      • String ID:
                                      • API String ID: 2695349919-0
                                      • Opcode ID: 0b014220ba697238806eb13b787266d0e669c1085b1fe09ecf0cf782a95e5e1b
                                      • Instruction ID: 04c26fbd13e8e472cbfab22d5fcef018e9b52ba2b69da948d06900d7ad6fd18d
                                      • Opcode Fuzzy Hash: 0b014220ba697238806eb13b787266d0e669c1085b1fe09ecf0cf782a95e5e1b
                                      • Instruction Fuzzy Hash: 5D31FF3180CA588FDB28DB98D8456FDBBF1FF65311F04412EE08AC3282CB74A846CB91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1464788503.00007FF887CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff887cf0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: r6B
                                      • API String ID: 0-2624010786
                                      • Opcode ID: 97b7fd3d35d4c764d0fc8c548d2fad54122c6ae1abaf9ccb000a68e233fbd739
                                      • Instruction ID: d085937366e4fe9f184abddc9d7dfb7fe37cebfdf06686834c74dd5076a74501
                                      • Opcode Fuzzy Hash: 97b7fd3d35d4c764d0fc8c548d2fad54122c6ae1abaf9ccb000a68e233fbd739
                                      • Instruction Fuzzy Hash: 6C510321A5D6C55FD796AB78A8243797FE1EF8B255B0800FBE08DC71E3DE485846C342
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1464788503.00007FF887CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff887cf0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 41815d5a5a6354fbe8c946684c49c4f01e6dc15697fb62f94984b44d9b473eb9
                                      • Instruction ID: 8b85f29585f35264e654e8ec3a17e30bd216e7632b5fefffea55a70671a4fa2f
                                      • Opcode Fuzzy Hash: 41815d5a5a6354fbe8c946684c49c4f01e6dc15697fb62f94984b44d9b473eb9
                                      • Instruction Fuzzy Hash: 14D10432A0D6960BE316B7BCE4512ED3BA1EF857B570801BBD49CCB193DD0C68878396
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1464788503.00007FF887CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff887cf0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: r6B
                                      • API String ID: 0-2624010786
                                      • Opcode ID: 56548e8f56ccdde18306fd7c7383ee9e2bd5e00a4f63ac9cd5f30fe2e4894abf
                                      • Instruction ID: 49ee89197124c0bbb3943fe0d534324eaa763105082cdd039993fa68b8519de1
                                      • Opcode Fuzzy Hash: 56548e8f56ccdde18306fd7c7383ee9e2bd5e00a4f63ac9cd5f30fe2e4894abf
                                      • Instruction Fuzzy Hash: D931A421F189495FE798AB6C986A37DA6D2EF9C751F0405BEE00EC32E3DE689C418341
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1464788503.00007FF887CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff887cf0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 6B
                                      • API String ID: 0-2065085838
                                      • Opcode ID: 48e25c9b3af187b7c3effbf8c4943fa6790c725f6a6f0341a8e51a55810c7bc8
                                      • Instruction ID: bdb5a686ed5ebcb3aa8bcfa19288e5c92a12b805ee3bf8dff60c494c223f19a8
                                      • Opcode Fuzzy Hash: 48e25c9b3af187b7c3effbf8c4943fa6790c725f6a6f0341a8e51a55810c7bc8
                                      • Instruction Fuzzy Hash: 5F316221F18A494FE784B7AC98593BC77E2FF98B51F040277E41DC7292DE6C98428752
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1464788503.00007FF887CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff887cf0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: HBL
                                      • API String ID: 0-3574280149
                                      • Opcode ID: e9dd20512da6dc77357731a97f4460272d05dbe98d7fe17fbe13144f2f955053
                                      • Instruction ID: 12cdb3dceab8a95236bda3db1c7f599eeaad4971a72b0b0c8ed07438d47ddd0d
                                      • Opcode Fuzzy Hash: e9dd20512da6dc77357731a97f4460272d05dbe98d7fe17fbe13144f2f955053
                                      • Instruction Fuzzy Hash: 2A31A230E18A098FEB48EBA8C4657FDB7B2FF98340F900579D009D3282DE386941C741
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1464788503.00007FF887CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff887cf0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 8eL
                                      • API String ID: 0-2915619072
                                      • Opcode ID: 03bcdd7780585c189f08474328a014b3d192935c33f82664b2a18f2ea7607a05
                                      • Instruction ID: 19f69190360113c3f7b5cc5f623c3cd5847b37733bd929737e7dd78e30426fe3
                                      • Opcode Fuzzy Hash: 03bcdd7780585c189f08474328a014b3d192935c33f82664b2a18f2ea7607a05
                                      • Instruction Fuzzy Hash: B201246090D6810FE786A238AC5197D7FF1EF912A0B0804BBE489C71E7D958A986C353
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1464788503.00007FF887CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff887cf0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 938d9fa83c8e48ac7a27bbceadc13139846765398b0f9f85e71c502bda52d7cf
                                      • Instruction ID: 0e97fbfdf9b50ff04bea5569a9d77d4b89564ec86a638874513f9cd3df9ddf94
                                      • Opcode Fuzzy Hash: 938d9fa83c8e48ac7a27bbceadc13139846765398b0f9f85e71c502bda52d7cf
                                      • Instruction Fuzzy Hash: D031D272E08B8A4FE705DB68D8A51ED7BB2FF85350B4501B7C049DB1D3DE286846C791
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1464788503.00007FF887CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff887cf0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e5f59af71041311ec84ee57e051cf51270049ba535a7141d205b09e11600eba8
                                      • Instruction ID: 18da94a7d2689032165efd1441b7312ff6436b644cd03d09db1fdd01d9aad856
                                      • Opcode Fuzzy Hash: e5f59af71041311ec84ee57e051cf51270049ba535a7141d205b09e11600eba8
                                      • Instruction Fuzzy Hash: 3921B062D58A8A5FE745D768C8A51FD7BB2FF85390F8440B6C00AD72E3DE6868068781
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1464788503.00007FF887CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff887cf0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 85c6b8a82c67f89e35fef3d05ece9e3c22b8a26015af8bbf7b8c48cdb541491b
                                      • Instruction ID: 5ebb1848bf60f271ee0aec44bf12492acd2c44859ded26100272b6760a601dea
                                      • Opcode Fuzzy Hash: 85c6b8a82c67f89e35fef3d05ece9e3c22b8a26015af8bbf7b8c48cdb541491b
                                      • Instruction Fuzzy Hash: EB516674B58A494FDB58BB78D4696BE7BB2FF48340B910479E01ED72C2DE389841C701
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1464788503.00007FF887CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff887cf0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c5ccc9dff574d80ddd69d4716af11d09ea43a82c7d0bc7c1c3a141542e78d131
                                      • Instruction ID: 17f02bcab447988b569512d7b4a7d07879e777811d8af2e076eb9c5885f5b7dc
                                      • Opcode Fuzzy Hash: c5ccc9dff574d80ddd69d4716af11d09ea43a82c7d0bc7c1c3a141542e78d131
                                      • Instruction Fuzzy Hash: 1B31D471A4864A4FDB44EB58D4646BEBF73FF88340BD145B6D019C338ACE386905CB42
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1554575130.00007FF887CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CE0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ff887ce0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: r6B
                                      • API String ID: 0-2624010786
                                      • Opcode ID: 7cd89538322d4db89ec117d2537578630758f79d8dafdaee3d80247aeb908fd4
                                      • Instruction ID: 209de1153675e1650278c5a6a7bca5eda815bddad4474853f1852d29139311aa
                                      • Opcode Fuzzy Hash: 7cd89538322d4db89ec117d2537578630758f79d8dafdaee3d80247aeb908fd4
                                      • Instruction Fuzzy Hash: AD511321A5DAC54FD796A77898653797FE1EF8B255B0800FAE08DC71D3DE0C4846C342
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1554575130.00007FF887CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CE0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ff887ce0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: r6B
                                      • API String ID: 0-2624010786
                                      • Opcode ID: 6a9c115d8f37162b1667194f17ddbf7107554bb7ec7d1d3556ddebf11b032ff2
                                      • Instruction ID: 9e446c6d10463cb2559400e28308bce9d5ab99ca1cad3f88c87a15ca07c1c258
                                      • Opcode Fuzzy Hash: 6a9c115d8f37162b1667194f17ddbf7107554bb7ec7d1d3556ddebf11b032ff2
                                      • Instruction Fuzzy Hash: D9319121B1C9495FE798AA6C986A37DA6D2EF9C751F0405BEE00EC32E3DE689C418341
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1554575130.00007FF887CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CE0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ff887ce0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 6B
                                      • API String ID: 0-2065085838
                                      • Opcode ID: bb31c88ad0323661c5d8af301f212feaa64b693e8f60ece40e881c92dada7230
                                      • Instruction ID: 270ce1836cad3314ba884c9865ae76ff8e89e9018d98dcd61c2bc3f4211e2340
                                      • Opcode Fuzzy Hash: bb31c88ad0323661c5d8af301f212feaa64b693e8f60ece40e881c92dada7230
                                      • Instruction Fuzzy Hash: 1C319122F18A494FF784B7A898593BD77E2FB98751F140277E41DC3292DE2C58428392
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1554575130.00007FF887CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CE0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ff887ce0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: HBL
                                      • API String ID: 0-3574280149
                                      • Opcode ID: 89155b1baebe0a39f50513da4b4032b8ca4eee4c2a90e7696a2ccf059764a020
                                      • Instruction ID: 6ac62dbf0f74e02b095536e68a1648a9e5390b28de57e49795757957cbbac98a
                                      • Opcode Fuzzy Hash: 89155b1baebe0a39f50513da4b4032b8ca4eee4c2a90e7696a2ccf059764a020
                                      • Instruction Fuzzy Hash: 6C316331E18A0D8FEB48EBA8C4657AD77B2FF98340F5445B5D019D7286CD3C6841CB52
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1554575130.00007FF887CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CE0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ff887ce0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 8eL
                                      • API String ID: 0-2915619072
                                      • Opcode ID: 2b8194063c00e4c06682c086e20ec2e667053700c7a4e26e184daad8912e9c17
                                      • Instruction ID: 46c82b5778a8bf4fb5853d51c896a119613121c408f154ce04c7ecb957317f82
                                      • Opcode Fuzzy Hash: 2b8194063c00e4c06682c086e20ec2e667053700c7a4e26e184daad8912e9c17
                                      • Instruction Fuzzy Hash: 06012812D0CAC14FE742A338D851A793FF2EF912A0B0804B7D488C70E7DD089981C393
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1554575130.00007FF887CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CE0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ff887ce0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 531f372d6f7a8a944e905540fa4d86f31edb72121061a1a4dad0a0608c484a80
                                      • Instruction ID: 163ad7360841f55666ed7e8cc85e5099905a3089b596877372233e48b464e152
                                      • Opcode Fuzzy Hash: 531f372d6f7a8a944e905540fa4d86f31edb72121061a1a4dad0a0608c484a80
                                      • Instruction Fuzzy Hash: 85510721A0D6C60FE357A778D8656B97BE2EF86650B1900FAD08DCB193DD1CAC46C353
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1554575130.00007FF887CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CE0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ff887ce0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e811d2fac7e723d0dd3fa5acc2ddadcbe8b89ccc6018d7007d97c65bbd19aee1
                                      • Instruction ID: 56ef7d236e2a4cdb20bc49859f20a5404ef34f305ae0437c3da85bae9e23a235
                                      • Opcode Fuzzy Hash: e811d2fac7e723d0dd3fa5acc2ddadcbe8b89ccc6018d7007d97c65bbd19aee1
                                      • Instruction Fuzzy Hash: 6F517335A58A498FDB98B7B8C4696EDB7E3FF54340B9004B9E40ED7286DE3C9800CB55
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1554575130.00007FF887CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CE0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ff887ce0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 83ec502d82fbdf80b5fcae60f1b9a9cda3e7d5e0da3c04c6db38728b097d739e
                                      • Instruction ID: cd6eb8c2f72054e94192a3e9cc340d26de03a6fab9a52c45b7c6667b38f289b6
                                      • Opcode Fuzzy Hash: 83ec502d82fbdf80b5fcae60f1b9a9cda3e7d5e0da3c04c6db38728b097d739e
                                      • Instruction Fuzzy Hash: 7931D624A086498FD789EB5CC0945ADBB63FF94344BA440E6D418D339FCE2C9905CB96
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1554575130.00007FF887CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CE0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ff887ce0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8185a2d5df916542ead752c4d8929df6aedaabed601296600c2b56aa240c3f2a
                                      • Instruction ID: 9d67013be1eff31ffdd53e7d8b31232eadf694f766e6aecbcb76af9db593b8d5
                                      • Opcode Fuzzy Hash: 8185a2d5df916542ead752c4d8929df6aedaabed601296600c2b56aa240c3f2a
                                      • Instruction Fuzzy Hash: E9D05E62D64A0F8BE784E798C8A52FEA3B2FF44380B408075C01DD31DACD3828008641
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1635864765.00007FF887CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_7ff887cf0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: r6B
                                      • API String ID: 0-2624010786
                                      • Opcode ID: 895d9ff0392c2220efc7b87fe4f63bd78f213a364df60c05a541c89df434048c
                                      • Instruction ID: 362d2bb09615d4a9b2527e731cd59797df3e8223b5123604bb438f227f7a2f1a
                                      • Opcode Fuzzy Hash: 895d9ff0392c2220efc7b87fe4f63bd78f213a364df60c05a541c89df434048c
                                      • Instruction Fuzzy Hash: 8E510321A5DAC55FD796AB78A8243797FE1EF8B255B0800FBE08DC71E3DE485846C342
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1635864765.00007FF887CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_7ff887cf0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4dcd54413aaf5c5c0f563c3186aa6ff904d087664554c59d5306e22df40040bd
                                      • Instruction ID: 8e881aab136c41b446e7fdb2347923add5209665290c9c966f2722d01c3dcd96
                                      • Opcode Fuzzy Hash: 4dcd54413aaf5c5c0f563c3186aa6ff904d087664554c59d5306e22df40040bd
                                      • Instruction Fuzzy Hash: 71D10432A0D6960BE316B7BCE4512ED3BA1EF857B570801BBD49CCB193DD0C68878396
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1635864765.00007FF887CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_7ff887cf0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: r6B
                                      • API String ID: 0-2624010786
                                      • Opcode ID: 3f2f580c052e0a6759f0880f31414ab71c28f1e4e42bee63069ecb50e6d9846b
                                      • Instruction ID: b5f9af3d8ee0ca3a0b51b98599f99bf35889db55d80b2b30195b32ac579437ff
                                      • Opcode Fuzzy Hash: 3f2f580c052e0a6759f0880f31414ab71c28f1e4e42bee63069ecb50e6d9846b
                                      • Instruction Fuzzy Hash: D531A421F189495FE798AB6C986A37DA7D2EF9C751F4405BEE00EC32E3DE689C418341
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1635864765.00007FF887CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_7ff887cf0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 6B
                                      • API String ID: 0-2065085838
                                      • Opcode ID: 48e25c9b3af187b7c3effbf8c4943fa6790c725f6a6f0341a8e51a55810c7bc8
                                      • Instruction ID: bdb5a686ed5ebcb3aa8bcfa19288e5c92a12b805ee3bf8dff60c494c223f19a8
                                      • Opcode Fuzzy Hash: 48e25c9b3af187b7c3effbf8c4943fa6790c725f6a6f0341a8e51a55810c7bc8
                                      • Instruction Fuzzy Hash: 5F316221F18A494FE784B7AC98593BC77E2FF98B51F040277E41DC7292DE6C98428752
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1635864765.00007FF887CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_7ff887cf0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: HBL
                                      • API String ID: 0-3574280149
                                      • Opcode ID: 1961194340801dbb6cde39a92211406742a1c4208e8ed8246a2368fa1ac41d5c
                                      • Instruction ID: 8772f1d5e21f2db3078f7045dc79b556a921ba09a19446efeef3f81861e938fd
                                      • Opcode Fuzzy Hash: 1961194340801dbb6cde39a92211406742a1c4208e8ed8246a2368fa1ac41d5c
                                      • Instruction Fuzzy Hash: 4531B230E18A0D8FEB84EBA8C4657EDB7B2FF88341F904479D009D3282CE386841CB42
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1635864765.00007FF887CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_7ff887cf0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 8eL
                                      • API String ID: 0-2915619072
                                      • Opcode ID: 51ce7e4b208976df22da4949214accc9526840f3ab9f59b3f7d7f206a526006e
                                      • Instruction ID: 23cffa35428439367b5f90b710928d591acf25c065ba2eb94ca395ffe8c026db
                                      • Opcode Fuzzy Hash: 51ce7e4b208976df22da4949214accc9526840f3ab9f59b3f7d7f206a526006e
                                      • Instruction Fuzzy Hash: ED01286494DB850FE742A238AC5157D7FF1EF912A0B0804BBE488C71E7D9589986C353
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1635864765.00007FF887CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_7ff887cf0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 19632b93a54a325dc0cc874f41e1ac4308ea84691324b68c50ae4020843a26bc
                                      • Instruction ID: 527a7d83edcd7e29b9b7d7c03d1ee4eb2d71d5af752085c704dfd3a8da739687
                                      • Opcode Fuzzy Hash: 19632b93a54a325dc0cc874f41e1ac4308ea84691324b68c50ae4020843a26bc
                                      • Instruction Fuzzy Hash: 1031BF72E0CB9A4FE7019B68D8A41ED7BB2FF85350B4501B7C049DB2D3DE2868468791
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1635864765.00007FF887CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_7ff887cf0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1265897883039c9aa04309fc2859e35951ca3089ae64f87a9707d4adcc74c522
                                      • Instruction ID: ec24455671913fb9ef8de116e1bd2cfc022d9a65693ecbd02ad8c9c1c2e6d9e7
                                      • Opcode Fuzzy Hash: 1265897883039c9aa04309fc2859e35951ca3089ae64f87a9707d4adcc74c522
                                      • Instruction Fuzzy Hash: 7D21AE62D5CB9A5FE7459668C8A41ED7BB2FF85380F8440B6C00AD72E3DE6868068781
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1635864765.00007FF887CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_7ff887cf0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 21112edf249238f7fb1aa6b3406fbe11c5eec981d695b9e3880a967c2f998b2e
                                      • Instruction ID: 5bb1e3dd560d81d9764a3ad2a2c91da759048ff7631d83f0a9b0120ce606f63e
                                      • Opcode Fuzzy Hash: 21112edf249238f7fb1aa6b3406fbe11c5eec981d695b9e3880a967c2f998b2e
                                      • Instruction Fuzzy Hash: 92515F64A68E0D4FDB98AB78D4697ADBBA2FF85340BD10479E41ED72C2DE289841C701
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1635864765.00007FF887CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_7ff887cf0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f4d08be60421be1cb5c19370a95e96ddc50496f8d605355863f89b51e89102a4
                                      • Instruction ID: 4b0ecef6423f13eea4cad4c449150e216d1b711c480bd08bf36dfa6bff8a2fec
                                      • Opcode Fuzzy Hash: f4d08be60421be1cb5c19370a95e96ddc50496f8d605355863f89b51e89102a4
                                      • Instruction Fuzzy Hash: B431D475A48E8E4FD784EB58D4646ADBF72FF84340BD045B6D418C33CACE286905CB52
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1955123167.00007FF887D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_7ff887d10000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: r6B
                                      • API String ID: 0-2624010786
                                      • Opcode ID: 175d40a54ba4b501b0ec8b90f2dc7c62b6269c042e5a807a1a24aa08e5208c13
                                      • Instruction ID: 918750a216f6988b3fbf9223cf46eb100688f8887b40a03ba432f32927f48f41
                                      • Opcode Fuzzy Hash: 175d40a54ba4b501b0ec8b90f2dc7c62b6269c042e5a807a1a24aa08e5208c13
                                      • Instruction Fuzzy Hash: C7513320B1D6C59FD796AB785825279BFE0EF87255B0802FAE08EC3193DD0C5846C352
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1955123167.00007FF887D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_7ff887d10000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a24c837a283fdf993d8b46a79cf394f0fca72f2b34591d55b9c4db51678d2b50
                                      • Instruction ID: 517c757ac2c4d5281cccb5136a330c91a18bf773c43ba2209a612b11984fcbd0
                                      • Opcode Fuzzy Hash: a24c837a283fdf993d8b46a79cf394f0fca72f2b34591d55b9c4db51678d2b50
                                      • Instruction Fuzzy Hash: F4D11B32A0D6964AF317B7BCA4552FD7BE0EF453A470842BBE49DCB093DC0C68468356
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1955123167.00007FF887D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_7ff887d10000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: r6B
                                      • API String ID: 0-2624010786
                                      • Opcode ID: c63777c64a2d856f1510f7a12a8c244d81516d40f83265a2ba46ca4f98d256bc
                                      • Instruction ID: 6a1010ccb7c53875c158b8781eec754c9bd6c28050a17c7be0be0b9d3163a05a
                                      • Opcode Fuzzy Hash: c63777c64a2d856f1510f7a12a8c244d81516d40f83265a2ba46ca4f98d256bc
                                      • Instruction Fuzzy Hash: 8031A621F189495FE698EB6C986A379B7D2EF99751F0406BEE00EC3293DD68AC418341
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1955123167.00007FF887D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_7ff887d10000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 6B
                                      • API String ID: 0-2065085838
                                      • Opcode ID: c890d2269fab8dfa5895c1a8bbfa1012eb8c10270df36bacba8f6cfd454821aa
                                      • Instruction ID: a6f29e872fa73e6e425f7a2c7dd0b1449ad3bb760652f3adcdbb15629ce3e7a6
                                      • Opcode Fuzzy Hash: c890d2269fab8dfa5895c1a8bbfa1012eb8c10270df36bacba8f6cfd454821aa
                                      • Instruction Fuzzy Hash: F1319221F18A4A4FE784B7AC98593BDB7E1FB98751F0403B7E41DC3296DE2C68428752
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1955123167.00007FF887D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_7ff887d10000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: HBL
                                      • API String ID: 0-3574280149
                                      • Opcode ID: 05bd33764a74aa340001c5e61e3c3f6ebfadcc437990787ab62724a832146167
                                      • Instruction ID: 1482445d6b6dbaf5168048ba1bad26dd21d0ebc2920b8b26634b2e0fe99ba5cb
                                      • Opcode Fuzzy Hash: 05bd33764a74aa340001c5e61e3c3f6ebfadcc437990787ab62724a832146167
                                      • Instruction Fuzzy Hash: 5E314F30A18A0D8FEB44FBA8C4657ADB7F2FF98341F544579D019D7686CE38A841CB51
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1955123167.00007FF887D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_7ff887d10000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 8eL
                                      • API String ID: 0-2915619072
                                      • Opcode ID: ccc6bdddc062def22e9a0588c45111c8eb5ad36bdbeed905e606e0b387d372d6
                                      • Instruction ID: 8954b651e4ea059d618cd5f2467f5ea5b360edcc995c44b4e24c13f8a6eb3048
                                      • Opcode Fuzzy Hash: ccc6bdddc062def22e9a0588c45111c8eb5ad36bdbeed905e606e0b387d372d6
                                      • Instruction Fuzzy Hash: E7012420A0C6858FE745A738580597ABFF0EF96391B0405F7E889C209BE918A981C3A3
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1955123167.00007FF887D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_7ff887d10000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3ff0ffa03226990acce52c250a4c7fc97e179178d0a35ce995ddff0806f4fa96
                                      • Instruction ID: 8da6a880021cc7fcb90a0e6f4cc4b5c8c37b9fc5a5478e516873670d0ebd648d
                                      • Opcode Fuzzy Hash: 3ff0ffa03226990acce52c250a4c7fc97e179178d0a35ce995ddff0806f4fa96
                                      • Instruction Fuzzy Hash: DC31E022E0978A5FE742E76C98A41EDBBF1FF42350B0502B3C44AC7197DE29284687A1
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1955123167.00007FF887D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_7ff887d10000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d648d3840f92791a2922c76fc056433cce72c88324e4c4e6c712ad70b627ef70
                                      • Instruction ID: a8fd89d4786703fca6a955a4eac30f7a75e9afe46166ab527043a32c31bee45e
                                      • Opcode Fuzzy Hash: d648d3840f92791a2922c76fc056433cce72c88324e4c4e6c712ad70b627ef70
                                      • Instruction Fuzzy Hash: AE21B021E59A8A6FE745A768C8641EDFBF1FF45380F4542B6C04AD31D7CE292841C7A1
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1955123167.00007FF887D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_7ff887d10000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c19cd5240020b8462adca676686b19d5b52a31282152307f1ad3b94316bfb734
                                      • Instruction ID: 41bf70f41577860f4b5ae8ee0f7eeb9ef1eb71c86bb0e990338797541416ca7f
                                      • Opcode Fuzzy Hash: c19cd5240020b8462adca676686b19d5b52a31282152307f1ad3b94316bfb734
                                      • Instruction Fuzzy Hash: 40515330A1860D8FDB54B778846D6AEF6F2FF88341B904579E05ED7686EE3C9800C711
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.1955123167.00007FF887D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_7ff887d10000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 53b73872933059c611e7af5cda6e391c40fdf37d9363827a3c4addc6d4933e8e
                                      • Instruction ID: b60397ca2c02c1a93e4d3a5ef86f9af597f091d9bc07de21fdd49159fa1bcb46
                                      • Opcode Fuzzy Hash: 53b73872933059c611e7af5cda6e391c40fdf37d9363827a3c4addc6d4933e8e
                                      • Instruction Fuzzy Hash: B531A720A4C64D8FD784FB5CC4556ADFBB2FF84344B9481B6D15AC3B8ACE6C5844CB52
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.2546681336.00007FF887CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CE0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_7ff887ce0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: r6B
                                      • API String ID: 0-2624010786
                                      • Opcode ID: 7fff31324adb87e5172ecd83eb1edae46bf7d224e8564ab702bec898aaa7672d
                                      • Instruction ID: 66c8354e876cd9cb13313f8f434cd987ef6c1ee184dbee61215e05993b32e7eb
                                      • Opcode Fuzzy Hash: 7fff31324adb87e5172ecd83eb1edae46bf7d224e8564ab702bec898aaa7672d
                                      • Instruction Fuzzy Hash: C9511321A5DAC94FD796A77898253797FE1EF8B255B0800FAE08DC71D3DE084846C342
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.2546681336.00007FF887CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CE0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_7ff887ce0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: r6B
                                      • API String ID: 0-2624010786
                                      • Opcode ID: 1b903b7b5c11eb7ae144d8a201734eca52a08e3d6c338ceb0983df00af2f496c
                                      • Instruction ID: 9152c01f2e2dfdc4fc2ffe9b7fb6c39ec34173ba4312b6b1b6912ad3c753d9bf
                                      • Opcode Fuzzy Hash: 1b903b7b5c11eb7ae144d8a201734eca52a08e3d6c338ceb0983df00af2f496c
                                      • Instruction Fuzzy Hash: 9C319121B1C9495FE798AA6C986A37DA6D2EF9C751F0405BEE00EC32E3DE689C418341
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.2546681336.00007FF887CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CE0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_7ff887ce0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 6B
                                      • API String ID: 0-2065085838
                                      • Opcode ID: bb31c88ad0323661c5d8af301f212feaa64b693e8f60ece40e881c92dada7230
                                      • Instruction ID: 270ce1836cad3314ba884c9865ae76ff8e89e9018d98dcd61c2bc3f4211e2340
                                      • Opcode Fuzzy Hash: bb31c88ad0323661c5d8af301f212feaa64b693e8f60ece40e881c92dada7230
                                      • Instruction Fuzzy Hash: 1C319122F18A494FF784B7A898593BD77E2FB98751F140277E41DC3292DE2C58428392
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.2546681336.00007FF887CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CE0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_7ff887ce0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: HBL
                                      • API String ID: 0-3574280149
                                      • Opcode ID: 635156a538c461caaa1b39b71c9b5cec9a309640c36ca12de5d52507763e0213
                                      • Instruction ID: d0573fea7920aac904bc8d43ae7f045017934e3b91d345c0e859b546ac801af5
                                      • Opcode Fuzzy Hash: 635156a538c461caaa1b39b71c9b5cec9a309640c36ca12de5d52507763e0213
                                      • Instruction Fuzzy Hash: 5831A071E18A0D8FEB44EBA8D4657EDB7B2FF98341F544579D019D3282CE38A841CB42
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.2546681336.00007FF887CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CE0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_7ff887ce0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 8eL
                                      • API String ID: 0-2915619072
                                      • Opcode ID: 73f8f112f65342dbbb828c5d576e07ba1c87e942742c565b815320db7adf4444
                                      • Instruction ID: bc95dbb50b81e9bf54caa9ff86d876b8c78864990786facef2ab41204d70d28d
                                      • Opcode Fuzzy Hash: 73f8f112f65342dbbb828c5d576e07ba1c87e942742c565b815320db7adf4444
                                      • Instruction Fuzzy Hash: C501F51294CA810FE742A238D8556797FB1EB913A0B0804BAD488C70E7D9089981C393
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.2546681336.00007FF887CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CE0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_7ff887ce0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f2645a3c8ed831349bd12b2f6e1d29cee818b9ebcb66638b88d36fc1fb75a245
                                      • Instruction ID: 7393f98cf610a6265d5ae449e9261eda7b0b49258eec8ec281e1a0a5a20b9019
                                      • Opcode Fuzzy Hash: f2645a3c8ed831349bd12b2f6e1d29cee818b9ebcb66638b88d36fc1fb75a245
                                      • Instruction Fuzzy Hash: CC512721A0DAC60FE357A778D8652B97BE2EF86650B1900FAD08DCB193CD1CAC46C353
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.2546681336.00007FF887CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CE0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_7ff887ce0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f95ab9106dc9232ee1aeeb1932fc9e60d9954115af535b9af07db34a54ec51cb
                                      • Instruction ID: 37a88e12b5e49d453fc9b80d0fd24d995a048fb0471ff6c63ccd39321ee5e25b
                                      • Opcode Fuzzy Hash: f95ab9106dc9232ee1aeeb1932fc9e60d9954115af535b9af07db34a54ec51cb
                                      • Instruction Fuzzy Hash: 70517E75A68A4D4FDB94B7B8D46D6ADBAA2FF84340F900479E40ED7282DE389800CB41
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.2546681336.00007FF887CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CE0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_7ff887ce0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6d893f4e0feb259b300a5ecc69d8be44dceef039dd44f7d68b4934995f2bf2b6
                                      • Instruction ID: dea13b93b7249de5faaa4cd155bbcb1929fe45433ca06b98500f1a243183fcd4
                                      • Opcode Fuzzy Hash: 6d893f4e0feb259b300a5ecc69d8be44dceef039dd44f7d68b4934995f2bf2b6
                                      • Instruction Fuzzy Hash: CB31B665A4864D4FD744EB68D099AADBF72FF84340F9444BAD518C338ACE285905CF92
                                      Memory Dump Source
                                      • Source File: 0000000C.00000002.2546681336.00007FF887CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887CE0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_12_2_7ff887ce0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 40f7512b93e6c15ba112b112198fae1212b4d4b5cff7a4a8dcae8c61f1034f5a
                                      • Instruction ID: 39c3e9823e901cdab905cbca7e6c35b760f0e2ba165a7031359af5727a785f04
                                      • Opcode Fuzzy Hash: 40f7512b93e6c15ba112b112198fae1212b4d4b5cff7a4a8dcae8c61f1034f5a
                                      • Instruction Fuzzy Hash: B0D05E62D64B2F8BE784E798D8652FEA7B2FF44381F448079C01DD31D6CD3828008641
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3151931888.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_7ff887d00000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: r6B
                                      • API String ID: 0-2624010786
                                      • Opcode ID: 7d362562534ba4f1fa390a89f27946c7e6c1a3ddd9798b1a6fe2f70fe4f73816
                                      • Instruction ID: 65b0c8c170fa5435cac5ba566e37d60061e2716e6b373d674136d5aa3d2d486d
                                      • Opcode Fuzzy Hash: 7d362562534ba4f1fa390a89f27946c7e6c1a3ddd9798b1a6fe2f70fe4f73816
                                      • Instruction Fuzzy Hash: 90512320A5E6C59FD796AB78586537ABFE0EF8B255B0801FAE08EC31D3DD085846C342
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3151931888.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_7ff887d00000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d4241980cad5cf09bd027c29d35102bcb35165b61e9615d7cef898f70a7168be
                                      • Instruction ID: 2cb55e08aa668e818a2dc88070ecdbadfebeca1c055432a1a30ac85c1fcb73e5
                                      • Opcode Fuzzy Hash: d4241980cad5cf09bd027c29d35102bcb35165b61e9615d7cef898f70a7168be
                                      • Instruction Fuzzy Hash: 27D10522A0D6960AE317B7BCA8552FD7BA0EF863B570801BBD59DCB093DD0C6447C396
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3151931888.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_7ff887d00000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: r6B
                                      • API String ID: 0-2624010786
                                      • Opcode ID: f210a86224b00196a6aac3017530f00db844b35fac0a8880bfaf039c092a24cf
                                      • Instruction ID: d3dc1d69f318c2e22a68d2daabac214cb23d8ccfcbe97f2de3550e9a982b932f
                                      • Opcode Fuzzy Hash: f210a86224b00196a6aac3017530f00db844b35fac0a8880bfaf039c092a24cf
                                      • Instruction Fuzzy Hash: CC31A621F189485FE698AB6C986A379A6D2FF9C751F4405BEE00EC3297DD68AC418342
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3151931888.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_7ff887d00000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 6B
                                      • API String ID: 0-2065085838
                                      • Opcode ID: 5a4189686fac618c6c84e2a63d4ddf8fd1a49e4c565da8f9bea8edfd21f9d446
                                      • Instruction ID: c1a1e3d9731d3f63dbdb49d2352dee60760b7c75d66c75fce119848a34572edf
                                      • Opcode Fuzzy Hash: 5a4189686fac618c6c84e2a63d4ddf8fd1a49e4c565da8f9bea8edfd21f9d446
                                      • Instruction Fuzzy Hash: F231B221F18A495FE784B7AC98193FD77E2FB98791F040277E41DC3296DE2C58428792
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3151931888.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_7ff887d00000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: HBL
                                      • API String ID: 0-3574280149
                                      • Opcode ID: a85918ab2f52bb8049e7ed496e319496965867a865517ec719e129a97c992f40
                                      • Instruction ID: 3ea330192ee86022fd1ed02f9d15b2636fd25613c66c879c09716a714368ab60
                                      • Opcode Fuzzy Hash: a85918ab2f52bb8049e7ed496e319496965867a865517ec719e129a97c992f40
                                      • Instruction Fuzzy Hash: 96319370E18A098FEB44FBA8D4657EDB7B2FF98340F944579D019D7286CE386841CB42
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3151931888.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_7ff887d00000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 8eL
                                      • API String ID: 0-2915619072
                                      • Opcode ID: f479875c7a185a6fe1efeaedcd812cb4da7464ab2e9f015856c0e55681ee77ff
                                      • Instruction ID: 9b8fd5deacf1e968e8489478148009b85dccf36423283358955e947056785718
                                      • Opcode Fuzzy Hash: f479875c7a185a6fe1efeaedcd812cb4da7464ab2e9f015856c0e55681ee77ff
                                      • Instruction Fuzzy Hash: 52012B20D0D6815FE785A77868159797FF0EF96390B4805B7E48DC60DBDC1CA985C393
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3151931888.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_7ff887d00000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 99a1612d53476637c5112f087e6029b8d0a8ea61f9f37607d909f5a2431a84a3
                                      • Instruction ID: 3e981e2df8fc6ebfedab782e0b2ce88ff9905b843041e2ff1b2fd1d4ff6c59f4
                                      • Opcode Fuzzy Hash: 99a1612d53476637c5112f087e6029b8d0a8ea61f9f37607d909f5a2431a84a3
                                      • Instruction Fuzzy Hash: EC31D232E087469FE706EB68C8A56ED7BB1FF45390B0502B7D04AD71D7CE28280AC791
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3151931888.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_7ff887d00000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7fbfb0f94e2b933bce0295e6acac2fb1408e7c315db7d78432a618ce5a241263
                                      • Instruction ID: 25a63c21b6ed3a2b22f5e2a81de36b1572a3f8fdc59b5a1d14bf553da4a6778c
                                      • Opcode Fuzzy Hash: 7fbfb0f94e2b933bce0295e6acac2fb1408e7c315db7d78432a618ce5a241263
                                      • Instruction Fuzzy Hash: 6F21F132D48A4A9FEB45E768CC655EDBBB2FF45380F4452B6C00AC71D7CE282805C791
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3151931888.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_7ff887d00000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ff4bade43b4c06713d64fd3e05f753a3321ba3653d65cf3e7db5f048b9b612c7
                                      • Instruction ID: 2ddf904de5088d3c4160d01aea844eaeba591850b5ceaa6256754510730880b9
                                      • Opcode Fuzzy Hash: ff4bade43b4c06713d64fd3e05f753a3321ba3653d65cf3e7db5f048b9b612c7
                                      • Instruction Fuzzy Hash: A2518274B546095FDB94BB78946DABDBAF2FF88340B940479E01ED72C6DE38A800C701
                                      Memory Dump Source
                                      • Source File: 0000000D.00000002.3151931888.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_13_2_7ff887d00000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1a3395221d04a8beefd1b84232a04136e24e8b897e052b3b389e4a8f8bdab3ca
                                      • Instruction ID: 7be49fac3a7d34f6ad4420296ad9bac2e3de39db644de40aea5b599f115e150b
                                      • Opcode Fuzzy Hash: 1a3395221d04a8beefd1b84232a04136e24e8b897e052b3b389e4a8f8bdab3ca
                                      • Instruction Fuzzy Hash: 7231C861A486494FD744FB98D4A96ADBF72FF84340BD485B6D019C738ACE38A944CB82
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.3750275426.00007FF887D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7ff887d10000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: r6B
                                      • API String ID: 0-2624010786
                                      • Opcode ID: 5f14ffbb120c8e4d5b889e3a7f23d8c7262739ce65d74fb8a95ed6d5bff523ff
                                      • Instruction ID: e34ba73401a88e9183dab0a102493cc8ae6efc21347b4a82593b7d325f83d682
                                      • Opcode Fuzzy Hash: 5f14ffbb120c8e4d5b889e3a7f23d8c7262739ce65d74fb8a95ed6d5bff523ff
                                      • Instruction Fuzzy Hash: 04513120B5D6C58FD796AB785825279BFE0EF8B255B0802FAE08EC31D3DD086846C352
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.3750275426.00007FF887D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7ff887d10000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5a37d5c46eaefbd167bb6c4f8a4834c26d3acd5f7d9fca23e7eb7d14464b7fa2
                                      • Instruction ID: 785a66b34bde3298f1d8e4c201f944f2b0328747a37543e661cfa73e96e5434a
                                      • Opcode Fuzzy Hash: 5a37d5c46eaefbd167bb6c4f8a4834c26d3acd5f7d9fca23e7eb7d14464b7fa2
                                      • Instruction Fuzzy Hash: C1D11A32A0D6964AF317B7BCA4552FD7BE0EF453A470842BBE49DCB093DC0C68468396
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.3750275426.00007FF887D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7ff887d10000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: r6B
                                      • API String ID: 0-2624010786
                                      • Opcode ID: b530c4eed88978463812d56be72aaf53016bf449112f00d3d4e347da538c5719
                                      • Instruction ID: 74e2a199b998f87c083cf87b05966f44e48d06d3c48e83c1c3fb930b72ef4bd6
                                      • Opcode Fuzzy Hash: b530c4eed88978463812d56be72aaf53016bf449112f00d3d4e347da538c5719
                                      • Instruction Fuzzy Hash: 8931A421F189495FE698EB6C986A379A7D2EF99751F0406BEE00EC32D3DD68AC418341
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.3750275426.00007FF887D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7ff887d10000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 6B
                                      • API String ID: 0-2065085838
                                      • Opcode ID: c890d2269fab8dfa5895c1a8bbfa1012eb8c10270df36bacba8f6cfd454821aa
                                      • Instruction ID: a6f29e872fa73e6e425f7a2c7dd0b1449ad3bb760652f3adcdbb15629ce3e7a6
                                      • Opcode Fuzzy Hash: c890d2269fab8dfa5895c1a8bbfa1012eb8c10270df36bacba8f6cfd454821aa
                                      • Instruction Fuzzy Hash: F1319221F18A4A4FE784B7AC98593BDB7E1FB98751F0403B7E41DC3296DE2C68428752
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.3750275426.00007FF887D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7ff887d10000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: HBL
                                      • API String ID: 0-3574280149
                                      • Opcode ID: bea9f7bdf96bbe505f6deacd01d70a1fd4f19fa044c8e0b0b9e58d8c352cae2e
                                      • Instruction ID: cebcd065bdd98479b7628201532501f521b7d6c482526a6d3119493ebeadb4dd
                                      • Opcode Fuzzy Hash: bea9f7bdf96bbe505f6deacd01d70a1fd4f19fa044c8e0b0b9e58d8c352cae2e
                                      • Instruction Fuzzy Hash: E6318070A58A498FEF48FBA8D4657BDB7B2FF98340F540679D009D7286CE386805C752
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.3750275426.00007FF887D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7ff887d10000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 8eL
                                      • API String ID: 0-2915619072
                                      • Opcode ID: a6db74f27a0ad16e5deaea30c923cda8d840741e876633224c37b27e1903a752
                                      • Instruction ID: 417474a2c40a2bef33542ab334269113c877c77e6bdcccb065ec4754b94e3778
                                      • Opcode Fuzzy Hash: a6db74f27a0ad16e5deaea30c923cda8d840741e876633224c37b27e1903a752
                                      • Instruction Fuzzy Hash: 9901D824A0C6814FE74567386805579BFB0EF95391B0405F7E889C60DBD8186985C3A3
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.3750275426.00007FF887D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7ff887d10000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4dbe37ea1ea5eef9833b557e92cefc758ba3e5508a91acd6dcb980ecc879e84f
                                      • Instruction ID: 9b9d1490692754e9e66d5b102db12f30ab340764b5ca7bb498254de3ca838b4e
                                      • Opcode Fuzzy Hash: 4dbe37ea1ea5eef9833b557e92cefc758ba3e5508a91acd6dcb980ecc879e84f
                                      • Instruction Fuzzy Hash: 8631F232E4978A5FE742D768D8A52FDBBF1FF42250B0502B3C44AC71D7DD29284687A1
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.3750275426.00007FF887D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7ff887d10000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6b98de6446c253021cdcf3e23f957725b58484047ed36b04aee259bee8360b90
                                      • Instruction ID: 1c2ed2c5068692e91acf670db9d20ccd37b7264767f574ffd03bce9becc22a2d
                                      • Opcode Fuzzy Hash: 6b98de6446c253021cdcf3e23f957725b58484047ed36b04aee259bee8360b90
                                      • Instruction Fuzzy Hash: EA210322E59A8A5FE745D768C8652FDFBF1FF45380F4542B6C00AC31D7CE29280187A1
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.3750275426.00007FF887D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7ff887d10000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ed1a52eb9a48d6f6dde39dfdf2f317a93ce819f31f1f578edf9cb9099d80bf76
                                      • Instruction ID: 160d8a7e54db86a615c89d638cf604e900dfafab598e2f2a9ae6b26b23eb1a69
                                      • Opcode Fuzzy Hash: ed1a52eb9a48d6f6dde39dfdf2f317a93ce819f31f1f578edf9cb9099d80bf76
                                      • Instruction Fuzzy Hash: 1D517475E586494FEF58B77894696BDFAA6FF88340B800579E41ED32C6ED3C9800C711
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.3750275426.00007FF887D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7ff887d10000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1cf014fedd50f0188ce073254f054ab3dbbf02ddca1ee36363cde5fd22db27ab
                                      • Instruction ID: a171c195606e62244c55de07ea0f32cddccf6e42e639382642ac87050710897e
                                      • Opcode Fuzzy Hash: 1cf014fedd50f0188ce073254f054ab3dbbf02ddca1ee36363cde5fd22db27ab
                                      • Instruction Fuzzy Hash: F831B465A4C6894FDF44FB6894956BCBE62FFC4340B9042BAD41DC37CACD2C5904CB92