Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
fiPZoO6xvJ.exe

Overview

General Information

Sample name:fiPZoO6xvJ.exe
renamed because original name is a hash value
Original sample name:04cfe85ad9f84a7bb65c39ed40e209fdd61f3a3cb52d0606a9fc41f780a2ba1f.exe
Analysis ID:1557199
MD5:f869f9d64a8a01aff088f8c830a477dc
SHA1:0e8af0081201e0d423abc29ae6f2cd948c12ba97
SHA256:04cfe85ad9f84a7bb65c39ed40e209fdd61f3a3cb52d0606a9fc41f780a2ba1f
Tags:exeuser-Chainskilabs
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Protects its processes via BreakOnTermination flag
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • fiPZoO6xvJ.exe (PID: 7052 cmdline: "C:\Users\user\Desktop\fiPZoO6xvJ.exe" MD5: F869F9D64A8A01AFF088F8C830A477DC)
  • cleanup
{"C2 url": ["sep-framing.gl.at.ply.gg"], "Port": 61526, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.2"}
SourceRuleDescriptionAuthorStrings
fiPZoO6xvJ.exeJoeSecurity_XWormYara detected XWormJoe Security
    fiPZoO6xvJ.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0x700a:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x70a7:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x71bc:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x6e7c:$cnc4: POST / HTTP/1.1
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.1671720847.0000000000CB2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_XWormYara detected XWormJoe Security
      00000000.00000000.1671720847.0000000000CB2000.00000002.00000001.01000000.00000003.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x6e0a:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x6ea7:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x6fbc:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0x6c7c:$cnc4: POST / HTTP/1.1
      Process Memory Space: fiPZoO6xvJ.exe PID: 7052JoeSecurity_XWormYara detected XWormJoe Security
        SourceRuleDescriptionAuthorStrings
        0.0.fiPZoO6xvJ.exe.cb0000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
          0.0.fiPZoO6xvJ.exe.cb0000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
          • 0x700a:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
          • 0x70a7:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
          • 0x71bc:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
          • 0x6e7c:$cnc4: POST / HTTP/1.1
          No Sigma rule has matched
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-17T19:18:05.525136+010028531931Malware Command and Control Activity Detected192.168.2.450014147.185.221.2361526TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: fiPZoO6xvJ.exeAvira: detected
          Source: sep-framing.gl.at.ply.ggAvira URL Cloud: Label: malware
          Source: fiPZoO6xvJ.exeMalware Configuration Extractor: Xworm {"C2 url": ["sep-framing.gl.at.ply.gg"], "Port": 61526, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.2"}
          Source: fiPZoO6xvJ.exeReversingLabs: Detection: 84%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: fiPZoO6xvJ.exeJoe Sandbox ML: detected
          Source: fiPZoO6xvJ.exeString decryptor: sep-framing.gl.at.ply.gg
          Source: fiPZoO6xvJ.exeString decryptor: 61526
          Source: fiPZoO6xvJ.exeString decryptor: <123456789>
          Source: fiPZoO6xvJ.exeString decryptor: <Xwormmm>
          Source: fiPZoO6xvJ.exeString decryptor: XWorm V5.2
          Source: fiPZoO6xvJ.exeString decryptor: USB.exe
          Source: fiPZoO6xvJ.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: fiPZoO6xvJ.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2855924 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.4:49777 -> 147.185.221.23:61526
          Source: Network trafficSuricata IDS: 2853193 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.4:50014 -> 147.185.221.23:61526
          Source: Malware configuration extractorURLs: sep-framing.gl.at.ply.gg
          Source: global trafficTCP traffic: 192.168.2.4:49730 -> 147.185.221.23:61526
          Source: Joe Sandbox ViewIP Address: 147.185.221.23 147.185.221.23
          Source: Joe Sandbox ViewASN Name: SALSGIVERUS SALSGIVERUS
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficDNS traffic detected: DNS query: sep-framing.gl.at.ply.gg
          Source: fiPZoO6xvJ.exe, 00000000.00000002.4116045005.0000000002FE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

          Operating System Destruction

          barindex
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: 01 00 00 00 Jump to behavior

          System Summary

          barindex
          Source: fiPZoO6xvJ.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
          Source: 0.0.fiPZoO6xvJ.exe.cb0000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
          Source: 00000000.00000000.1671720847.0000000000CB2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeCode function: 0_2_00007FFD9B7F63210_2_00007FFD9B7F6321
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeCode function: 0_2_00007FFD9B7F74D10_2_00007FFD9B7F74D1
          Source: fiPZoO6xvJ.exe, 00000000.00000000.1671720847.0000000000CB2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameXClient.exe4 vs fiPZoO6xvJ.exe
          Source: fiPZoO6xvJ.exeBinary or memory string: OriginalFilenameXClient.exe4 vs fiPZoO6xvJ.exe
          Source: fiPZoO6xvJ.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: fiPZoO6xvJ.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
          Source: 0.0.fiPZoO6xvJ.exe.cb0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
          Source: 00000000.00000000.1671720847.0000000000CB2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
          Source: fiPZoO6xvJ.exe, Helper.csCryptographic APIs: 'TransformFinalBlock'
          Source: fiPZoO6xvJ.exe, Helper.csCryptographic APIs: 'TransformFinalBlock'
          Source: fiPZoO6xvJ.exe, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
          Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@1/1
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeMutant created: NULL
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeMutant created: \Sessions\1\BaseNamedObjects\wCIHQbYCz8ryLWwh
          Source: fiPZoO6xvJ.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: fiPZoO6xvJ.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: fiPZoO6xvJ.exeReversingLabs: Detection: 84%
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
          Source: fiPZoO6xvJ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: fiPZoO6xvJ.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Data Obfuscation

          barindex
          Source: fiPZoO6xvJ.exe, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
          Source: fiPZoO6xvJ.exe, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
          Source: fiPZoO6xvJ.exe, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[1] { Pack[2] }}, (string[])null, (Type[])null, (bool[])null, true)
          Source: fiPZoO6xvJ.exe, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
          Source: fiPZoO6xvJ.exe, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
          Source: fiPZoO6xvJ.exe, Messages.cs.Net Code: Memory
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeCode function: 0_2_00007FFD9B7F73A8 push eax; retn 9B6Eh0_2_00007FFD9B7F73D1
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeCode function: 0_2_00007FFD9B7F00AD pushad ; iretd 0_2_00007FFD9B7F00C1
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeMemory allocated: 13E0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeMemory allocated: 1AFE0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWindow / User API: threadDelayed 8380Jump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWindow / User API: threadDelayed 1469Jump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exe TID: 5500Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeFile Volume queried: unknown FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeFile Volume queried: unknown FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeFile Volume queried: unknown FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeFile Volume queried: unknown FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeFile Volume queried: unknown FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeFile Volume queried: unknown FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeFile Volume queried: unknown FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeFile Volume queried: unknown FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeFile Volume queried: unknown FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeFile Volume queried: unknown FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeFile Volume queried: unknown FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeFile Volume queried: unknown FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeFile Volume queried: unknown FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeFile Volume queried: unknown FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: fiPZoO6xvJ.exe, 00000000.00000002.4114782058.0000000001168000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeMemory allocated: page read and write | page guardJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeQueries volume information: C:\Users\user\Desktop\fiPZoO6xvJ.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
          Source: fiPZoO6xvJ.exe, 00000000.00000002.4117443777.000000001BF6F000.00000004.00000020.00020000.00000000.sdmp, fiPZoO6xvJ.exe, 00000000.00000002.4117443777.000000001BF60000.00000004.00000020.00020000.00000000.sdmp, fiPZoO6xvJ.exe, 00000000.00000002.4114782058.00000000010FC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\fiPZoO6xvJ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: fiPZoO6xvJ.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.fiPZoO6xvJ.exe.cb0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1671720847.0000000000CB2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: fiPZoO6xvJ.exe PID: 7052, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: fiPZoO6xvJ.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.fiPZoO6xvJ.exe.cb0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1671720847.0000000000CB2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: fiPZoO6xvJ.exe PID: 7052, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
          Windows Management Instrumentation
          1
          DLL Side-Loading
          1
          DLL Side-Loading
          1
          Disable or Modify Tools
          OS Credential Dumping121
          Security Software Discovery
          Remote Services11
          Archive Collected Data
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts131
          Virtualization/Sandbox Evasion
          LSASS Memory131
          Virtualization/Sandbox Evasion
          Remote Desktop ProtocolData from Removable Media1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
          Deobfuscate/Decode Files or Information
          Security Account Manager1
          Application Window Discovery
          SMB/Windows Admin SharesData from Network Shared Drive1
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          Obfuscated Files or Information
          NTDS13
          System Information Discovery
          Distributed Component Object ModelInput Capture11
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
          Software Packing
          LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          DLL Side-Loading
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          fiPZoO6xvJ.exe84%ReversingLabsByteCode-MSIL.Spyware.AsyncRAT
          fiPZoO6xvJ.exe100%AviraHEUR/AGEN.1305769
          fiPZoO6xvJ.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          sep-framing.gl.at.ply.gg100%Avira URL Cloudmalware
          NameIPActiveMaliciousAntivirus DetectionReputation
          sep-framing.gl.at.ply.gg
          147.185.221.23
          truetrue
            unknown
            NameMaliciousAntivirus DetectionReputation
            sep-framing.gl.at.ply.ggtrue
            • Avira URL Cloud: malware
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namefiPZoO6xvJ.exe, 00000000.00000002.4116045005.0000000002FE1000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              147.185.221.23
              sep-framing.gl.at.ply.ggUnited States
              12087SALSGIVERUStrue
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1557199
              Start date and time:2024-11-17 19:15:07 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 6m 38s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:4
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Sample name:fiPZoO6xvJ.exe
              renamed because original name is a hash value
              Original Sample Name:04cfe85ad9f84a7bb65c39ed40e209fdd61f3a3cb52d0606a9fc41f780a2ba1f.exe
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@1/0@1/1
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 99%
              • Number of executed functions: 3
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240000 for current running targets taking high CPU consumption
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • VT rate limit hit for: fiPZoO6xvJ.exe
              TimeTypeDescription
              13:16:05API Interceptor13990875x Sleep call for process: fiPZoO6xvJ.exe modified
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              147.185.221.23EternalPredictor.exeGet hashmaliciousBlank Grabber, Skuld Stealer, XWormBrowse
                eternal.exeGet hashmaliciousXWormBrowse
                  svchost.exeGet hashmaliciousUnknownBrowse
                    msedge_visual_render.exeGet hashmaliciousXWormBrowse
                      exe030.exeGet hashmaliciousXWormBrowse
                        pQm8Ci3Dov.exeGet hashmaliciousXWormBrowse
                          jkL96SLfWS.exeGet hashmaliciousXWormBrowse
                            xtrSvgqQEW.exeGet hashmaliciousXWormBrowse
                              7PRbdkCn03.exeGet hashmaliciousXWormBrowse
                                8Hd0ZExgJz.exeGet hashmaliciousBlank Grabber, Umbral Stealer, XWormBrowse
                                  No context
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  SALSGIVERUSEternalPredictor.exeGet hashmaliciousBlank Grabber, Skuld Stealer, XWormBrowse
                                  • 147.185.221.23
                                  eternal.exeGet hashmaliciousXWormBrowse
                                  • 147.185.221.23
                                  svchost.exeGet hashmaliciousUnknownBrowse
                                  • 147.185.221.23
                                  msedge_visual_render.exeGet hashmaliciousXWormBrowse
                                  • 147.185.221.23
                                  exe030.exeGet hashmaliciousXWormBrowse
                                  • 147.185.221.23
                                  pQm8Ci3Dov.exeGet hashmaliciousXWormBrowse
                                  • 147.185.221.23
                                  jkL96SLfWS.exeGet hashmaliciousXWormBrowse
                                  • 147.185.221.23
                                  xtrSvgqQEW.exeGet hashmaliciousXWormBrowse
                                  • 147.185.221.23
                                  7PRbdkCn03.exeGet hashmaliciousXWormBrowse
                                  • 147.185.221.23
                                  8Hd0ZExgJz.exeGet hashmaliciousBlank Grabber, Umbral Stealer, XWormBrowse
                                  • 147.185.221.23
                                  No context
                                  No context
                                  No created / dropped files found
                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):5.58078155357564
                                  TrID:
                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                  • Win32 Executable (generic) a (10002005/4) 49.75%
                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                  • Windows Screen Saver (13104/52) 0.07%
                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                  File name:fiPZoO6xvJ.exe
                                  File size:34'304 bytes
                                  MD5:f869f9d64a8a01aff088f8c830a477dc
                                  SHA1:0e8af0081201e0d423abc29ae6f2cd948c12ba97
                                  SHA256:04cfe85ad9f84a7bb65c39ed40e209fdd61f3a3cb52d0606a9fc41f780a2ba1f
                                  SHA512:0da21ecb4896f716b1fb3b3e8813eb268aabd84f1e51f29c24fc6b8349ccfbd377d957828b437882d5ef65c654001f25a65259777ecd18980cdd0116afde876c
                                  SSDEEP:384:Cl8UlK/V9FoBZ9aZV0NLx7o92lKZaJZvf/95ApkFy7BLT/OZwpGmTv99IkcisOHh:qO/VMOGxwgJZvn9dFyJ9FoOjh4Jy
                                  TLSH:78F24B4837914225D6EE3FF1ADB3A1060274D617C927EB9F0CD441EBAB63AC58700BE6
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...L.9g.................|............... ........@.. ....................................@................................
                                  Icon Hash:90cececece8e8eb0
                                  Entrypoint:0x409b0e
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x6739AE4C [Sun Nov 17 08:50:20 2024 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                  Instruction
                                  jmp dword ptr [00402000h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x9abc0x4f.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xa0000x4d8.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xc0000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000x7b140x7c008868dbde4d5fff9caa88f973e162b0cdFalse0.49584173387096775data5.726671623495559IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rsrc0xa0000x4d80x600afbb984503128042cc38bf70e5e337f4False0.375data3.7203482473352403IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0xc0000xc0x2008bfdc7fd839058f8bc277331f431d643False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_VERSION0xa0a00x244data0.4724137931034483
                                  RT_MANIFEST0xa2e80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                  DLLImport
                                  mscoree.dll_CorExeMain
                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                  2024-11-17T19:17:07.929287+01002855924ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.449777147.185.221.2361526TCP
                                  2024-11-17T19:18:05.525136+01002853193ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.450014147.185.221.2361526TCP
                                  TimestampSource PortDest PortSource IPDest IP
                                  Nov 17, 2024 19:16:05.771622896 CET4973061526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:16:05.776608944 CET6152649730147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:16:05.776681900 CET4973061526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:16:06.007509947 CET4973061526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:16:06.012517929 CET6152649730147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:16:14.285363913 CET6152649730147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:16:14.285450935 CET4973061526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:16:14.837414026 CET4973061526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:16:14.840703011 CET4973161526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:16:14.843070030 CET6152649730147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:16:14.845859051 CET6152649731147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:16:14.846076965 CET4973161526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:16:14.864183903 CET4973161526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:16:14.869270086 CET6152649731147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:16:23.334609985 CET6152649731147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:16:23.334736109 CET4973161526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:16:24.602937937 CET4973161526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:16:24.605499029 CET4973861526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:16:24.680284023 CET6152649731147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:16:24.680308104 CET6152649738147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:16:24.680469036 CET4973861526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:16:24.702389002 CET4973861526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:16:24.707329035 CET6152649738147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:16:33.170145035 CET6152649738147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:16:33.170242071 CET4973861526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:16:34.527549028 CET4973861526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:16:34.528704882 CET4973961526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:16:34.532694101 CET6152649738147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:16:34.533684969 CET6152649739147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:16:34.533781052 CET4973961526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:16:34.548069000 CET4973961526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:16:34.553071022 CET6152649739147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:16:43.011862993 CET6152649739147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:16:43.012149096 CET4973961526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:16:45.915419102 CET4973961526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:16:45.916697025 CET4974061526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:16:45.920423985 CET6152649739147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:16:45.921685934 CET6152649740147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:16:45.921770096 CET4974061526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:16:45.936173916 CET4974061526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:16:45.941028118 CET6152649740147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:16:54.419629097 CET6152649740147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:16:54.419708967 CET4974061526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:16:55.743662119 CET4974061526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:16:55.744703054 CET4974261526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:16:55.748743057 CET6152649740147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:16:55.749664068 CET6152649742147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:16:55.749779940 CET4974261526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:16:55.764524937 CET4974261526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:16:55.769901991 CET6152649742147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:04.245646000 CET6152649742147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:04.245774031 CET4974261526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:04.467664957 CET4974261526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:04.473268032 CET6152649742147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:04.477029085 CET4977761526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:04.482650042 CET6152649777147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:04.482748032 CET4977761526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:04.502926111 CET4977761526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:04.507862091 CET6152649777147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:07.929286957 CET4977761526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:07.937973976 CET6152649777147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:12.964086056 CET6152649777147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:12.964195967 CET4977761526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:12.979043961 CET4977761526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:12.979063988 CET4982761526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:12.984039068 CET6152649777147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:12.984055996 CET6152649827147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:12.984174013 CET4982761526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:13.086205006 CET4982761526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:13.091128111 CET6152649827147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:13.181224108 CET4982761526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:13.187510967 CET6152649827147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:18.979542971 CET4982761526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:18.985436916 CET6152649827147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:21.465509892 CET6152649827147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:21.465607882 CET4982761526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:23.307574034 CET4982761526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:23.311572075 CET4988561526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:23.312608957 CET6152649827147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:23.316653013 CET6152649885147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:23.316776037 CET4988561526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:23.408183098 CET4988561526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:23.413098097 CET6152649885147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:28.540791035 CET4988561526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:28.545646906 CET6152649885147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:28.634622097 CET4988561526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:28.639671087 CET6152649885147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:28.697010994 CET4988561526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:28.703778982 CET6152649885147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:28.712436914 CET4988561526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:28.717495918 CET6152649885147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:31.811943054 CET6152649885147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:31.812021017 CET4988561526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:33.743649960 CET4988561526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:33.746248007 CET4994461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:33.749780893 CET6152649885147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:33.752342939 CET6152649944147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:33.752696991 CET4994461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:33.787482023 CET4994461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:33.792553902 CET6152649944147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:33.837687969 CET4994461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:33.843559980 CET6152649944147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:37.025042057 CET4994461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:37.031671047 CET6152649944147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:37.243973970 CET4994461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:37.248954058 CET6152649944147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:39.056355000 CET4994461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:39.062489986 CET6152649944147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:39.587641954 CET4994461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:39.592617989 CET6152649944147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:42.228302956 CET6152649944147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:42.228457928 CET4994461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:44.087404013 CET4994461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:44.090393066 CET5000361526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:44.092418909 CET6152649944147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:44.095330954 CET6152650003147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:44.095402956 CET5000361526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:44.128077030 CET5000361526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:44.133194923 CET6152650003147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:44.181288958 CET5000361526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:44.186260939 CET6152650003147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:45.946926117 CET5000361526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:45.951828003 CET6152650003147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:46.947272062 CET5000361526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:46.952369928 CET6152650003147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:52.578094006 CET6152650003147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:52.578166008 CET5000361526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:54.556557894 CET5000361526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:54.559225082 CET5001361526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:54.562185049 CET6152650003147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:54.565126896 CET6152650013147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:17:54.565265894 CET5001361526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:54.630594969 CET5001361526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:17:54.636115074 CET6152650013147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:00.306478024 CET5001361526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:00.313230038 CET6152650013147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:00.321944952 CET5001361526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:00.327805996 CET6152650013147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:00.337822914 CET5001361526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:00.343005896 CET6152650013147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:03.061378956 CET6152650013147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:03.061578989 CET5001361526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:05.400089025 CET5001361526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:05.403918028 CET5001461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:05.405544996 CET6152650013147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:05.409095049 CET6152650014147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:05.409164906 CET5001461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:05.443409920 CET5001461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:05.448426008 CET6152650014147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:05.478167057 CET5001461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:05.483282089 CET6152650014147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:05.525135994 CET5001461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:05.530241966 CET6152650014147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:05.556531906 CET5001461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:05.561645985 CET6152650014147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:05.634927034 CET5001461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:05.640063047 CET6152650014147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:05.665667057 CET5001461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:05.670672894 CET6152650014147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:05.696894884 CET5001461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:05.702357054 CET6152650014147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:10.667651892 CET5001461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:10.673479080 CET6152650014147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:13.906744957 CET6152650014147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:13.907331944 CET5001461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:15.790541887 CET5001461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:15.792853117 CET5001561526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:15.795859098 CET6152650014147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:15.797840118 CET6152650015147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:15.797982931 CET5001561526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:15.975363970 CET5001561526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:15.980668068 CET6152650015147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:21.040796995 CET5001561526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:21.046751976 CET6152650015147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:21.056297064 CET5001561526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:21.061944962 CET6152650015147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:21.087716103 CET5001561526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:21.094647884 CET6152650015147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:21.134495974 CET5001561526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:21.140064955 CET6152650015147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:21.243985891 CET5001561526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:21.250199080 CET6152650015147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:22.587881088 CET5001561526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:22.593110085 CET6152650015147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:24.304579973 CET6152650015147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:24.304661036 CET5001561526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:26.306308985 CET5001561526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:26.307888031 CET5001661526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:26.312391996 CET6152650015147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:26.313613892 CET6152650016147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:26.315785885 CET5001661526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:26.397737026 CET5001661526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:26.403470039 CET6152650016147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:31.510018110 CET5001661526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:31.514853954 CET6152650016147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:31.806534052 CET5001661526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:31.811485052 CET6152650016147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:32.322125912 CET5001661526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:32.327229023 CET6152650016147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:34.791913986 CET6152650016147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:34.795741081 CET5001661526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:36.839749098 CET5001661526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:36.839920044 CET5001761526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:36.845222950 CET6152650016147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:36.845241070 CET6152650017147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:36.845310926 CET5001761526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:36.881458044 CET5001761526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:36.886437893 CET6152650017147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:37.009593964 CET5001761526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:37.014682055 CET6152650017147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:45.339905977 CET6152650017147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:45.339982033 CET5001761526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:47.368805885 CET5001761526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:47.370709896 CET5001861526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:47.373753071 CET6152650017147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:47.375569105 CET6152650018147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:47.375653982 CET5001861526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:47.415343046 CET5001861526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:47.420509100 CET6152650018147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:55.870970964 CET6152650018147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:55.871053934 CET5001861526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:57.462634087 CET5001861526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:57.465869904 CET5001961526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:57.467586994 CET6152650018147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:57.470829964 CET6152650019147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:57.470909119 CET5001961526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:57.507407904 CET5001961526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:57.513092995 CET6152650019147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:57.587913990 CET5001961526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:57.592828035 CET6152650019147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:57.618944883 CET5001961526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:57.623949051 CET6152650019147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:18:58.587868929 CET5001961526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:18:58.593141079 CET6152650019147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:04.587830067 CET5001961526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:04.593492985 CET6152650019147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:05.963042974 CET6152650019147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:05.966058016 CET5001961526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:07.790952921 CET5001961526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:07.793627024 CET5002061526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:07.796422958 CET6152650019147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:07.799068928 CET6152650020147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:07.799308062 CET5002061526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:07.846107006 CET5002061526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:07.851186037 CET6152650020147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:13.072243929 CET5002061526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:13.077795029 CET6152650020147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:16.294538021 CET6152650020147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:16.295020103 CET5002061526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:18.091289997 CET5002061526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:18.096999884 CET6152650020147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:18.111372948 CET5002161526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:18.117269039 CET6152650021147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:18.118925095 CET5002161526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:18.382036924 CET5002161526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:18.387252092 CET6152650021147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:23.478389025 CET5002161526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:23.483289957 CET6152650021147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:23.556787014 CET5002161526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:23.561912060 CET6152650021147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:23.666063070 CET5002161526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:23.670911074 CET6152650021147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:23.791310072 CET5002161526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:23.796327114 CET6152650021147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:23.838232040 CET5002161526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:23.843204975 CET6152650021147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:24.697830915 CET5002161526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:24.702888012 CET6152650021147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:26.612576962 CET6152650021147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:26.616051912 CET5002161526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:28.868982077 CET5002161526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:28.871889114 CET5002261526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:28.873908043 CET6152650021147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:28.876846075 CET6152650022147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:28.880230904 CET5002261526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:28.984672070 CET5002261526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:28.989876986 CET6152650022147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:28.994236946 CET5002261526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:28.999177933 CET6152650022147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:29.009882927 CET5002261526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:29.015341997 CET6152650022147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:29.072192907 CET5002261526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:29.077018023 CET6152650022147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:31.322232008 CET5002261526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:31.327321053 CET6152650022147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:37.372158051 CET6152650022147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:37.372356892 CET5002261526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:39.166156054 CET5002261526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:39.168538094 CET5002361526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:39.171405077 CET6152650022147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:39.173703909 CET6152650023147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:39.173774958 CET5002361526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:39.207159996 CET5002361526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:39.212215900 CET6152650023147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:39.259913921 CET5002361526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:39.265173912 CET6152650023147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:39.275307894 CET5002361526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:39.280452967 CET6152650023147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:41.431544065 CET5002361526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:41.436413050 CET6152650023147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:44.775363922 CET5002361526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:44.780706882 CET6152650023147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:47.150507927 CET5002361526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:47.155786991 CET6152650023147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:47.650407076 CET6152650023147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:47.650474072 CET5002361526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:49.369040012 CET5002361526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:49.370677948 CET5002461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:49.374247074 CET6152650023147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:49.375809908 CET6152650024147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:49.375890017 CET5002461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:49.410901070 CET5002461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:49.416964054 CET6152650024147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:49.447371006 CET5002461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:49.453989983 CET6152650024147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:49.509805918 CET5002461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:49.514794111 CET6152650024147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:49.525365114 CET5002461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:49.530446053 CET6152650024147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:49.540957928 CET5002461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:49.546389103 CET6152650024147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:49.587737083 CET5002461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:49.593013048 CET6152650024147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:49.618995905 CET5002461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:49.624149084 CET6152650024147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:49.634591103 CET5002461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:49.639884949 CET6152650024147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:50.371895075 CET5002461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:50.376815081 CET6152650024147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:55.619143963 CET5002461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:55.624464035 CET6152650024147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:57.858660936 CET6152650024147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:57.858743906 CET5002461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:59.665781975 CET5002461526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:59.667948961 CET5002561526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:59.670849085 CET6152650024147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:59.672926903 CET6152650025147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:19:59.672995090 CET5002561526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:59.707428932 CET5002561526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:19:59.712312937 CET6152650025147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:20:02.212965012 CET5002561526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:20:02.217995882 CET6152650025147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:20:03.259654045 CET5002561526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:20:03.265317917 CET6152650025147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:20:08.148813009 CET6152650025147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:20:08.149061918 CET5002561526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:20:08.259661913 CET5002561526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:20:08.260679007 CET5002661526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:20:08.264767885 CET6152650025147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:20:08.265762091 CET6152650026147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:20:08.265966892 CET5002661526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:20:08.315650940 CET5002661526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:20:08.320683002 CET6152650026147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:20:16.763355970 CET6152650026147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:20:16.764091015 CET5002661526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:20:17.775300026 CET5002661526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:20:17.776555061 CET5002761526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:20:17.780257940 CET6152650026147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:20:17.781464100 CET6152650027147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:20:17.781585932 CET5002761526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:20:17.798737049 CET5002761526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:20:17.803685904 CET6152650027147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:20:26.263565063 CET6152650027147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:20:26.263629913 CET5002761526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:20:33.837886095 CET5002761526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:20:33.838587999 CET5002861526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:20:33.843210936 CET6152650027147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:20:33.843451977 CET6152650028147.185.221.23192.168.2.4
                                  Nov 17, 2024 19:20:33.843559980 CET5002861526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:20:33.854520082 CET5002861526192.168.2.4147.185.221.23
                                  Nov 17, 2024 19:20:33.859461069 CET6152650028147.185.221.23192.168.2.4
                                  TimestampSource PortDest PortSource IPDest IP
                                  Nov 17, 2024 19:16:05.740852118 CET5023153192.168.2.41.1.1.1
                                  Nov 17, 2024 19:16:05.753779888 CET53502311.1.1.1192.168.2.4
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Nov 17, 2024 19:16:05.740852118 CET192.168.2.41.1.1.10x3032Standard query (0)sep-framing.gl.at.ply.ggA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Nov 17, 2024 19:16:05.753779888 CET1.1.1.1192.168.2.40x3032No error (0)sep-framing.gl.at.ply.gg147.185.221.23A (IP address)IN (0x0001)false

                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Target ID:0
                                  Start time:13:15:57
                                  Start date:17/11/2024
                                  Path:C:\Users\user\Desktop\fiPZoO6xvJ.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Users\user\Desktop\fiPZoO6xvJ.exe"
                                  Imagebase:0xcb0000
                                  File size:34'304 bytes
                                  MD5 hash:F869F9D64A8A01AFF088F8C830A477DC
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000000.1671720847.0000000000CB2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000000.1671720847.0000000000CB2000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                  Reputation:low
                                  Has exited:false

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:20.1%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:3
                                    Total number of Limit Nodes:0
                                    execution_graph 3083 7ffd9b7f184d 3084 7ffd9b7f18b0 RtlSetProcessIsCritical 3083->3084 3086 7ffd9b7f1932 3084->3086

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 181 7ffd9b7f6321-7ffd9b7f6387 184 7ffd9b7f6389-7ffd9b7f6392 181->184 185 7ffd9b7f63f3 181->185 184->185 186 7ffd9b7f6394-7ffd9b7f63a0 184->186 187 7ffd9b7f63f5-7ffd9b7f641a 185->187 188 7ffd9b7f63d9-7ffd9b7f63f1 186->188 189 7ffd9b7f63a2-7ffd9b7f63b4 186->189 194 7ffd9b7f641c-7ffd9b7f6425 187->194 195 7ffd9b7f6486 187->195 188->187 190 7ffd9b7f63b8-7ffd9b7f63cb 189->190 191 7ffd9b7f63b6 189->191 190->190 193 7ffd9b7f63cd-7ffd9b7f63d5 190->193 191->190 193->188 194->195 197 7ffd9b7f6427-7ffd9b7f6433 194->197 196 7ffd9b7f6488-7ffd9b7f6530 195->196 208 7ffd9b7f6532-7ffd9b7f653c 196->208 209 7ffd9b7f659e 196->209 198 7ffd9b7f646c-7ffd9b7f6484 197->198 199 7ffd9b7f6435-7ffd9b7f6447 197->199 198->196 200 7ffd9b7f644b-7ffd9b7f645e 199->200 201 7ffd9b7f6449 199->201 200->200 203 7ffd9b7f6460-7ffd9b7f6468 200->203 201->200 203->198 208->209 211 7ffd9b7f653e-7ffd9b7f654b 208->211 210 7ffd9b7f65a0-7ffd9b7f65c9 209->210 218 7ffd9b7f65cb-7ffd9b7f65d6 210->218 219 7ffd9b7f6633 210->219 212 7ffd9b7f6584-7ffd9b7f659c 211->212 213 7ffd9b7f654d-7ffd9b7f655f 211->213 212->210 214 7ffd9b7f6563-7ffd9b7f6576 213->214 215 7ffd9b7f6561 213->215 214->214 217 7ffd9b7f6578-7ffd9b7f6580 214->217 215->214 217->212 218->219 221 7ffd9b7f65d8-7ffd9b7f65e6 218->221 220 7ffd9b7f6635-7ffd9b7f66c6 219->220 229 7ffd9b7f66cc-7ffd9b7f66db 220->229 222 7ffd9b7f65e8-7ffd9b7f65fa 221->222 223 7ffd9b7f661f-7ffd9b7f6631 221->223 225 7ffd9b7f65fc 222->225 226 7ffd9b7f65fe-7ffd9b7f6611 222->226 223->220 225->226 226->226 227 7ffd9b7f6613-7ffd9b7f661b 226->227 227->223 230 7ffd9b7f66e3-7ffd9b7f673b call 7ffd9b7f6764 229->230 231 7ffd9b7f66dd 229->231 231->230
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.4118040649.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ffd9b7f0000_fiPZoO6xvJ.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c9420f772e9ea19c5e0ab968d4bf30231816b3d92bd5eb30608f7136b4da71fc
                                    • Instruction ID: 7214fcebd16aa922a07865fbabe6d2dccc24fc78cace56f4414b10496edaa040
                                    • Opcode Fuzzy Hash: c9420f772e9ea19c5e0ab968d4bf30231816b3d92bd5eb30608f7136b4da71fc
                                    • Instruction Fuzzy Hash: 49D16030A19A4D8FEBA8EF28C855BE977D1FF58300F14426AD81EC72A5DB34D944CB81

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 238 7ffd9b7f74d1-7ffd9b7f7537 241 7ffd9b7f7539-7ffd9b7f7542 238->241 242 7ffd9b7f75a3 238->242 241->242 243 7ffd9b7f7544-7ffd9b7f7550 241->243 244 7ffd9b7f75a5-7ffd9b7f75ca 242->244 245 7ffd9b7f7589-7ffd9b7f75a1 243->245 246 7ffd9b7f7552-7ffd9b7f7564 243->246 250 7ffd9b7f75cc-7ffd9b7f75d5 244->250 251 7ffd9b7f7636 244->251 245->244 247 7ffd9b7f7568-7ffd9b7f757b 246->247 248 7ffd9b7f7566 246->248 247->247 252 7ffd9b7f757d-7ffd9b7f7585 247->252 248->247 250->251 253 7ffd9b7f75d7-7ffd9b7f75e3 250->253 254 7ffd9b7f7638-7ffd9b7f765d 251->254 252->245 255 7ffd9b7f761c-7ffd9b7f7634 253->255 256 7ffd9b7f75e5-7ffd9b7f75f7 253->256 261 7ffd9b7f76cb 254->261 262 7ffd9b7f765f-7ffd9b7f7669 254->262 255->254 257 7ffd9b7f75fb-7ffd9b7f760e 256->257 258 7ffd9b7f75f9 256->258 257->257 260 7ffd9b7f7610-7ffd9b7f7618 257->260 258->257 260->255 263 7ffd9b7f76cd-7ffd9b7f76fb 261->263 262->261 264 7ffd9b7f766b-7ffd9b7f7678 262->264 271 7ffd9b7f776b 263->271 272 7ffd9b7f76fd-7ffd9b7f7708 263->272 265 7ffd9b7f767a-7ffd9b7f768c 264->265 266 7ffd9b7f76b1-7ffd9b7f76c9 264->266 268 7ffd9b7f7690-7ffd9b7f76a3 265->268 269 7ffd9b7f768e 265->269 266->263 268->268 270 7ffd9b7f76a5-7ffd9b7f76ad 268->270 269->268 270->266 274 7ffd9b7f776d-7ffd9b7f7845 271->274 272->271 273 7ffd9b7f770a-7ffd9b7f7718 272->273 275 7ffd9b7f771a-7ffd9b7f772c 273->275 276 7ffd9b7f7751-7ffd9b7f7769 273->276 284 7ffd9b7f784b-7ffd9b7f785a 274->284 278 7ffd9b7f7730-7ffd9b7f7743 275->278 279 7ffd9b7f772e 275->279 276->274 278->278 281 7ffd9b7f7745-7ffd9b7f774d 278->281 279->278 281->276 285 7ffd9b7f785c 284->285 286 7ffd9b7f7862-7ffd9b7f78b7 call 7ffd9b7f78e0 284->286 285->286
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.4118040649.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ffd9b7f0000_fiPZoO6xvJ.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9e8fca873f9cf403201f89315240eb7dc9fb0ba496d1be1125c871eb0228e339
                                    • Instruction ID: 959c02255787ae4df68a6b9f8ee800cf95fd9aa1fa2a296e02d1545207cfff82
                                    • Opcode Fuzzy Hash: 9e8fca873f9cf403201f89315240eb7dc9fb0ba496d1be1125c871eb0228e339
                                    • Instruction Fuzzy Hash: 3BD16030B18A4E8FEBA8DF68C8557E977D1FB58301F14826ED81DC72A5CE7499408BC1

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.4118040649.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ffd9b7f0000_fiPZoO6xvJ.jbxd
                                    Similarity
                                    • API ID: CriticalProcess
                                    • String ID:
                                    • API String ID: 2695349919-0
                                    • Opcode ID: 21604836faada2d8f0783a6defd8d6fe37311a538fe9f7e206d05ff655e045de
                                    • Instruction ID: c60afc81c474c7245a26734864bec0b49802f92b58dadf7318ed8915e0bd3d8f
                                    • Opcode Fuzzy Hash: 21604836faada2d8f0783a6defd8d6fe37311a538fe9f7e206d05ff655e045de
                                    • Instruction Fuzzy Hash: 8341F23190C6588FDB19DF98C845BE9BBF0FF56311F04416EE09AC3692CB78A846CB91