Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe

Overview

General Information

Sample name:173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe
Analysis ID:1569859
MD5:b4743a6a5638d49c9f30f552727423b3
SHA1:ac26bfe26083f1097a9abb3c5c0d34d6173b10d6
SHA256:4a568c15ed2c33916d74ce97eb7fd7b39a3e184c2c637ea7cb7a7a3e1e2e5108
Tags:base64-decodedexeuser-abuse_ch
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • cleanup
{"C2 url": ["87.120.116.179"], "Port": 1300, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe"}
SourceRuleDescriptionAuthorStrings
173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeJoeSecurity_XWormYara detected XWormJoe Security
    173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0x7a30:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x7acd:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x7be2:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x76de:$cnc4: POST / HTTP/1.1
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.2093444836.0000000000712000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_XWormYara detected XWormJoe Security
      00000000.00000000.2093444836.0000000000712000.00000002.00000001.01000000.00000003.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x7830:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x78cd:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x79e2:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0x74de:$cnc4: POST / HTTP/1.1
      00000000.00000002.3468154623.0000000002A21000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
        Process Memory Space: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe PID: 6500JoeSecurity_XWormYara detected XWormJoe Security
          SourceRuleDescriptionAuthorStrings
          0.0.173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe.710000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
            0.0.173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe.710000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0x7a30:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x7acd:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x7be2:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x76de:$cnc4: POST / HTTP/1.1
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-06T10:53:20.859432+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:53:23.012619+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:53:33.807978+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:53:46.824653+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:53:52.999772+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:54:00.015380+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:54:13.017743+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:54:17.369849+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:54:18.870204+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:54:22.543724+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:54:23.006227+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:54:23.223101+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:54:25.741168+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:54:30.660004+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:54:31.276861+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:54:32.365095+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:54:35.605713+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:54:35.859927+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:54:44.656533+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:54:47.283987+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:54:47.476031+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:54:47.607896+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:54:50.480564+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:54:53.036106+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:54:54.652876+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:54:55.407907+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:54:57.530420+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:54:59.452325+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:55:02.161487+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:55:07.821410+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:55:07.975265+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:55:08.097254+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:55:08.217398+010028528701Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-06T10:53:20.913339+010028529231Malware Command and Control Activity Detected192.168.2.64970987.120.116.1791300TCP
            2024-12-06T10:53:33.811007+010028529231Malware Command and Control Activity Detected192.168.2.64970987.120.116.1791300TCP
            2024-12-06T10:53:46.830354+010028529231Malware Command and Control Activity Detected192.168.2.64970987.120.116.1791300TCP
            2024-12-06T10:54:00.025595+010028529231Malware Command and Control Activity Detected192.168.2.64970987.120.116.1791300TCP
            2024-12-06T10:54:13.029761+010028529231Malware Command and Control Activity Detected192.168.2.64970987.120.116.1791300TCP
            2024-12-06T10:54:17.470002+010028529231Malware Command and Control Activity Detected192.168.2.64970987.120.116.1791300TCP
            2024-12-06T10:54:18.874964+010028529231Malware Command and Control Activity Detected192.168.2.64970987.120.116.1791300TCP
            2024-12-06T10:54:22.546680+010028529231Malware Command and Control Activity Detected192.168.2.64970987.120.116.1791300TCP
            2024-12-06T10:54:23.224868+010028529231Malware Command and Control Activity Detected192.168.2.64970987.120.116.1791300TCP
            2024-12-06T10:54:25.743429+010028529231Malware Command and Control Activity Detected192.168.2.64970987.120.116.1791300TCP
            2024-12-06T10:54:30.662935+010028529231Malware Command and Control Activity Detected192.168.2.64970987.120.116.1791300TCP
            2024-12-06T10:54:31.281192+010028529231Malware Command and Control Activity Detected192.168.2.64970987.120.116.1791300TCP
            2024-12-06T10:54:32.367420+010028529231Malware Command and Control Activity Detected192.168.2.64970987.120.116.1791300TCP
            2024-12-06T10:54:35.609597+010028529231Malware Command and Control Activity Detected192.168.2.64970987.120.116.1791300TCP
            2024-12-06T10:54:35.862462+010028529231Malware Command and Control Activity Detected192.168.2.64970987.120.116.1791300TCP
            2024-12-06T10:54:44.659163+010028529231Malware Command and Control Activity Detected192.168.2.64970987.120.116.1791300TCP
            2024-12-06T10:54:47.295257+010028529231Malware Command and Control Activity Detected192.168.2.64970987.120.116.1791300TCP
            2024-12-06T10:54:47.482432+010028529231Malware Command and Control Activity Detected192.168.2.64970987.120.116.1791300TCP
            2024-12-06T10:54:47.610132+010028529231Malware Command and Control Activity Detected192.168.2.64970987.120.116.1791300TCP
            2024-12-06T10:54:50.483648+010028529231Malware Command and Control Activity Detected192.168.2.64970987.120.116.1791300TCP
            2024-12-06T10:54:54.655059+010028529231Malware Command and Control Activity Detected192.168.2.64970987.120.116.1791300TCP
            2024-12-06T10:54:55.412215+010028529231Malware Command and Control Activity Detected192.168.2.64970987.120.116.1791300TCP
            2024-12-06T10:54:57.535709+010028529231Malware Command and Control Activity Detected192.168.2.64970987.120.116.1791300TCP
            2024-12-06T10:54:59.459333+010028529231Malware Command and Control Activity Detected192.168.2.64970987.120.116.1791300TCP
            2024-12-06T10:55:02.163481+010028529231Malware Command and Control Activity Detected192.168.2.64970987.120.116.1791300TCP
            2024-12-06T10:55:07.905385+010028529231Malware Command and Control Activity Detected192.168.2.64970987.120.116.1791300TCP
            2024-12-06T10:55:08.025501+010028529231Malware Command and Control Activity Detected192.168.2.64970987.120.116.1791300TCP
            2024-12-06T10:55:08.145400+010028529231Malware Command and Control Activity Detected192.168.2.64970987.120.116.1791300TCP
            2024-12-06T10:55:08.265216+010028529231Malware Command and Control Activity Detected192.168.2.64970987.120.116.1791300TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-06T10:53:23.012619+010028528741Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:53:52.999772+010028528741Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:54:23.006227+010028528741Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            2024-12-06T10:54:53.036106+010028528741Malware Command and Control Activity Detected87.120.116.1791300192.168.2.649709TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-06T10:53:20.470318+010028559241Malware Command and Control Activity Detected192.168.2.64970987.120.116.1791300TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeAvira: detected
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeMalware Configuration Extractor: Xworm {"C2 url": ["87.120.116.179"], "Port": 1300, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe"}
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeReversingLabs: Detection: 84%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeJoe Sandbox ML: detected
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeString decryptor: 87.120.116.179
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeString decryptor: 1300
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeString decryptor: <123456789>
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeString decryptor: <Xwormmm>
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeString decryptor: 02-12-24
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeString decryptor: USB.exe
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: System.Windows.Forms.ni.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: .pdb2 source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3473524059.000000001B5E9000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: System.Drawing.ni.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: mscorlib.pdbcorlib.pdbpdblib.pdbC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3473524059.000000001B5E9000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER3193.tmp.dmp.6.dr
            Source: Binary string: System.Drawing.ni.pdbRSDS source: WER3193.tmp.dmp.6.dr
            Source: Binary string: 0C:\Windows\mscorlib.pdb source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3473524059.000000001B5E9000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: System.Xml.ni.pdbRSDS# source: WER3193.tmp.dmp.6.dr
            Source: Binary string: System.Core.ni.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: Microsoft.VisualBasic.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3473524059.000000001B5E9000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbC$ source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3466018270.0000000000C34000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3466018270.0000000000C34000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER3193.tmp.dmp.6.dr
            Source: Binary string: mscorlib.pdbMZ@ source: WER3193.tmp.dmp.6.dr
            Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WER3193.tmp.dmp.6.dr
            Source: Binary string: mscorlib.ni.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: \??\C:\Windows\mscorlib.pdb source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3473726847.000000001B9F0000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Xml.pdbSystem.Configuration.ni.dll source: WER3193.tmp.dmp.6.dr
            Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER3193.tmp.dmp.6.dr
            Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbl source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3473726847.000000001BA3D000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: System.Xml.ni.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: System.Drawing.pdbP source: WER3193.tmp.dmp.6.dr
            Source: Binary string: System.ni.pdbRSDS source: WER3193.tmp.dmp.6.dr
            Source: Binary string: System.Management.pdbq1 source: WER3193.tmp.dmp.6.dr
            Source: Binary string: System.Core.pdbSystem.Xml.ni.dllSystem.Management.dll.> source: WER3193.tmp.dmp.6.dr
            Source: Binary string: \??\C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.PDBaMm source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3473726847.000000001B9F0000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Configuration.ni.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb` source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3473726847.000000001BA3D000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WER3193.tmp.dmp.6.dr
            Source: Binary string: System.Configuration.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: symbols\dll\mscorlib.pdbpdb` source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3473524059.000000001B5E9000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: System.Xml.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: System.Windows.Forms.pdb` source: WER3193.tmp.dmp.6.dr
            Source: Binary string: System.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb,R( source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3473726847.000000001B9F0000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Windows.Forms.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: mscorlib.pdb source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3473726847.000000001BA6A000.00000004.00000020.00020000.00000000.sdmp, 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3473726847.000000001BA6C000.00000004.00000020.00020000.00000000.sdmp, WER3193.tmp.dmp.6.dr
            Source: Binary string: System.Management.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: System.Drawing.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: System.Management.ni.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: System.Core.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: mscorlib.pdbTEM source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3473726847.000000001B9F0000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\mscorlib.pdb|B source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3473726847.000000001B9F0000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: indoC:\Windows\mscorlib.pdb source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3473524059.000000001B5E9000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: System.ni.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: System.Core.ni.pdbRSDS source: WER3193.tmp.dmp.6.dr

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2855924 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.6:49709 -> 87.120.116.179:1300
            Source: Network trafficSuricata IDS: 2852870 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes : 87.120.116.179:1300 -> 192.168.2.6:49709
            Source: Network trafficSuricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.6:49709 -> 87.120.116.179:1300
            Source: Network trafficSuricata IDS: 2852874 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 : 87.120.116.179:1300 -> 192.168.2.6:49709
            Source: Malware configuration extractorURLs: 87.120.116.179
            Source: global trafficTCP traffic: 192.168.2.6:49709 -> 87.120.116.179:1300
            Source: Joe Sandbox ViewASN Name: UNACS-AS-BG8000BurgasBG UNACS-AS-BG8000BurgasBG
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3468154623.0000000002A21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, XLogger.cs.Net Code: KeyboardLayout

            System Summary

            barindex
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 0.0.173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe.710000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000000.00000000.2093444836.0000000000712000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeCode function: 0_2_00007FFD348977110_2_00007FFD34897711
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeCode function: 0_2_00007FFD34892A580_2_00007FFD34892A58
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeCode function: 0_2_00007FFD348969610_2_00007FFD34896961
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeCode function: 0_2_00007FFD34892A000_2_00007FFD34892A00
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6500 -s 1756
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000000.2093459800.000000000071C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamefecha.exe4 vs 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeBinary or memory string: OriginalFilenamefecha.exe4 vs 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 0.0.173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe.710000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000000.00000000.2093444836.0000000000712000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, Helper.csCryptographic APIs: 'TransformFinalBlock'
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, Helper.csCryptographic APIs: 'TransformFinalBlock'
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@2/5@0/1
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeMutant created: NULL
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeMutant created: \Sessions\1\BaseNamedObjects\B48go7npq3kwDYCH
            Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6500
            Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\00024f70-2a8b-4ee8-b472-4737bb54f8a8Jump to behavior
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeReversingLabs: Detection: 84%
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeFile read: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe "C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe"
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6500 -s 1756
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeSection loaded: avicap32.dllJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeSection loaded: msvfw32.dllJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: System.Windows.Forms.ni.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: .pdb2 source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3473524059.000000001B5E9000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: System.Drawing.ni.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: mscorlib.pdbcorlib.pdbpdblib.pdbC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3473524059.000000001B5E9000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER3193.tmp.dmp.6.dr
            Source: Binary string: System.Drawing.ni.pdbRSDS source: WER3193.tmp.dmp.6.dr
            Source: Binary string: 0C:\Windows\mscorlib.pdb source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3473524059.000000001B5E9000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: System.Xml.ni.pdbRSDS# source: WER3193.tmp.dmp.6.dr
            Source: Binary string: System.Core.ni.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: Microsoft.VisualBasic.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3473524059.000000001B5E9000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbC$ source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3466018270.0000000000C34000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3466018270.0000000000C34000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER3193.tmp.dmp.6.dr
            Source: Binary string: mscorlib.pdbMZ@ source: WER3193.tmp.dmp.6.dr
            Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WER3193.tmp.dmp.6.dr
            Source: Binary string: mscorlib.ni.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: \??\C:\Windows\mscorlib.pdb source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3473726847.000000001B9F0000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Xml.pdbSystem.Configuration.ni.dll source: WER3193.tmp.dmp.6.dr
            Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER3193.tmp.dmp.6.dr
            Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbl source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3473726847.000000001BA3D000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: System.Xml.ni.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: System.Drawing.pdbP source: WER3193.tmp.dmp.6.dr
            Source: Binary string: System.ni.pdbRSDS source: WER3193.tmp.dmp.6.dr
            Source: Binary string: System.Management.pdbq1 source: WER3193.tmp.dmp.6.dr
            Source: Binary string: System.Core.pdbSystem.Xml.ni.dllSystem.Management.dll.> source: WER3193.tmp.dmp.6.dr
            Source: Binary string: \??\C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.PDBaMm source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3473726847.000000001B9F0000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Configuration.ni.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb` source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3473726847.000000001BA3D000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WER3193.tmp.dmp.6.dr
            Source: Binary string: System.Configuration.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: symbols\dll\mscorlib.pdbpdb` source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3473524059.000000001B5E9000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: System.Xml.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: System.Windows.Forms.pdb` source: WER3193.tmp.dmp.6.dr
            Source: Binary string: System.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb,R( source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3473726847.000000001B9F0000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Windows.Forms.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: mscorlib.pdb source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3473726847.000000001BA6A000.00000004.00000020.00020000.00000000.sdmp, 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3473726847.000000001BA6C000.00000004.00000020.00020000.00000000.sdmp, WER3193.tmp.dmp.6.dr
            Source: Binary string: System.Management.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: System.Drawing.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: System.Management.ni.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: System.Core.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: mscorlib.pdbTEM source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3473726847.000000001B9F0000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\mscorlib.pdb|B source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3473726847.000000001B9F0000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: indoC:\Windows\mscorlib.pdb source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3473524059.000000001B5E9000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: System.ni.pdb source: WER3193.tmp.dmp.6.dr
            Source: Binary string: System.Core.ni.pdbRSDS source: WER3193.tmp.dmp.6.dr

            Data Obfuscation

            barindex
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[1] { Pack[2] }}, (string[])null, (Type[])null, (bool[])null, true)
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, Messages.cs.Net Code: Memory
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeMemory allocated: B90000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeMemory allocated: 1AA20000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeWindow / User API: threadDelayed 4769Jump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeWindow / User API: threadDelayed 5062Jump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe TID: 6368Thread sleep time: -1844674407370954s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe TID: 1616Thread sleep count: 4769 > 30Jump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe TID: 1616Thread sleep count: 5062 > 30Jump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: Amcache.hve.6.drBinary or memory string: VMware
            Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
            Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
            Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
            Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
            Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
            Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
            Source: Amcache.hve.6.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
            Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
            Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
            Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3473726847.000000001B9F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW <%SystemRoot%\system32\mswsock.dlldlImporters>
            Source: Amcache.hve.6.drBinary or memory string: vmci.sys
            Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
            Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
            Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: Amcache.hve.6.drBinary or memory string: VMware20,1
            Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
            Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
            Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
            Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
            Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
            Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
            Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
            Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
            Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
            Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
            Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeQueries volume information: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
            Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
            Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
            Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
            Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe
            Source: C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe.710000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.2093444836.0000000000712000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3468154623.0000000002A21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe PID: 6500, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe.710000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.2093444836.0000000000712000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3468154623.0000000002A21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe PID: 6500, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            Process Injection
            1
            Disable or Modify Tools
            1
            Input Capture
            131
            Security Software Discovery
            Remote Services1
            Input Capture
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            DLL Side-Loading
            141
            Virtualization/Sandbox Evasion
            LSASS Memory1
            Process Discovery
            Remote Desktop Protocol11
            Archive Collected Data
            1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
            Process Injection
            Security Account Manager141
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive1
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Deobfuscate/Decode Files or Information
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
            Software Packing
            LSA Secrets13
            System Information Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            DLL Side-Loading
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe84%ReversingLabsByteCode-MSIL.Spyware.AsyncRAT
            173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe100%AviraTR/Spy.Gen
            173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            87.120.116.1790%Avira URL Cloudsafe
            No contacted domains info
            NameMaliciousAntivirus DetectionReputation
            87.120.116.179true
            • Avira URL Cloud: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://upx.sf.netAmcache.hve.6.drfalse
              high
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe, 00000000.00000002.3468154623.0000000002A21000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                87.120.116.179
                unknownBulgaria
                25206UNACS-AS-BG8000BurgasBGtrue
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1569859
                Start date and time:2024-12-06 10:52:09 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 6m 14s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:7
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe
                Detection:MAL
                Classification:mal100.troj.spyw.evad.winEXE@2/5@0/1
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 98%
                • Number of executed functions: 5
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Override analysis time to 240000 for current running targets taking high CPU consumption
                • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                • Excluded IPs from analysis (whitelisted): 52.168.117.173
                • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                • Report size getting too big, too many NtSetInformationFile calls found.
                • VT rate limit hit for: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe
                TimeTypeDescription
                04:53:06API Interceptor4501706x Sleep call for process: 173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe modified
                04:55:13API Interceptor1x Sleep call for process: WerFault.exe modified
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                87.120.116.1791733477410ba2e5b8e1739578ed6933c4e69d66a81049f523c11599f36b2f5da870a31538a881.dat-decoded.exeGet hashmaliciousXWormBrowse
                  17334774117b7343420a7b9efab7c5b1abd0627c7af1c91f9947163684497ce841bf5f9198533.dat-decoded.exeGet hashmaliciousXWormBrowse
                    17334769266ba75a70859e94894e9fae5c33bba300e2b004c1166d236dc1ab2c8ff5669916631.dat-decoded.exeGet hashmaliciousXWormBrowse
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      UNACS-AS-BG8000BurgasBG1733477410ba2e5b8e1739578ed6933c4e69d66a81049f523c11599f36b2f5da870a31538a881.dat-decoded.exeGet hashmaliciousXWormBrowse
                      • 87.120.116.179
                      17334774117b7343420a7b9efab7c5b1abd0627c7af1c91f9947163684497ce841bf5f9198533.dat-decoded.exeGet hashmaliciousXWormBrowse
                      • 87.120.116.179
                      17334769266ba75a70859e94894e9fae5c33bba300e2b004c1166d236dc1ab2c8ff5669916631.dat-decoded.exeGet hashmaliciousXWormBrowse
                      • 87.120.116.179
                      yIla7SeJ6r.docGet hashmaliciousXenoRATBrowse
                      • 87.120.120.27
                      gjot5vxpIC.exeGet hashmaliciousXenoRATBrowse
                      • 87.120.120.27
                      file.exeGet hashmaliciousAmadey, AsyncRAT, Stealc, VidarBrowse
                      • 87.120.125.31
                      po4877383.exeGet hashmaliciousRedLineBrowse
                      • 87.120.120.86
                      e824975.htmlGet hashmaliciousUnknownBrowse
                      • 87.120.114.172
                      qqig1mHX8U.exeGet hashmaliciousAveMaria, DBatLoader, UACMeBrowse
                      • 87.120.125.217
                      No context
                      No context
                      Process:C:\Windows\System32\WerFault.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):1.2837951756032393
                      Encrypted:false
                      SSDEEP:192:3flGivSg2ntt3081iHRmuaWz8iyrHltlFTzuiF+Z24lO8WnY:3ghDnc81iZa48iYVTzuiF+Y4lO8n
                      MD5:6533E92EA8ED8035661B8D44A7ADEE09
                      SHA1:09ADF82B0A6056F63F60FA50CF6ED35F2EAB436C
                      SHA-256:221DD6B71F6F868E547922B1FDE8757900961ABDD1645D16C999766B076E6BE6
                      SHA-512:09749D540D18B88EBCD9AA381BF87ECAACDBEBF5A291C6D91D6F18FAC755839F27E7E86C6876F5F8E5398007D28005F2D1F7290E17E8F7CD2D4938BDAB0C4179
                      Malicious:false
                      Reputation:low
                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.7.9.5.2.5.0.8.4.3.0.6.9.8.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.7.9.5.2.5.0.9.0.5.5.6.8.3.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.c.b.d.a.c.7.f.-.0.f.8.4.-.4.b.6.1.-.b.a.d.1.-.7.f.f.d.e.a.0.d.5.c.a.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.a.d.a.c.3.1.3.-.5.2.3.c.-.4.1.6.7.-.a.7.e.9.-.3.3.f.9.8.f.4.b.c.b.a.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.1.7.3.3.4.7.7.4.1.0.9.0.e.2.3.c.9.e.b.d.2.c.4.b.6.0.4.c.7.1.6.2.3.7.6.3.c.b.c.e.9.9.a.e.c.6.5.0.e.3.f.9.e.2.7.d.3.5.f.4.f.3.d.c.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.f.e.c.h.a...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.6.4.-.0.0.0.1.-.0.0.1.5.-.0.8.b.c.-.a.8.a.0.c.4.4.7.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.6.4.b.e.7.3.f.7.7.3.9.8.8.8.1.0.c.b.9.e.a.6.e.1.4.c.7.0.0.3.9.0.0.0.0.0.0.0.0.!.0.0.0.0.a.c.2.6.b.
                      Process:C:\Windows\System32\WerFault.exe
                      File Type:Mini DuMP crash report, 16 streams, Fri Dec 6 09:55:08 2024, 0x1205a4 type
                      Category:dropped
                      Size (bytes):587670
                      Entropy (8bit):3.024150247191282
                      Encrypted:false
                      SSDEEP:3072:0xarvo9ES1K291CCqKKRKuF73+vtPcybn4aP2FE1bcSK2Pt6:0xarSES/qKkKA3QhtrTOE1PZV
                      MD5:955E943C4CE3CA394F82D3454CAD4851
                      SHA1:F184D96752B718F04D831B8E28A6583047F420B9
                      SHA-256:868B2EDD6199EA0E765F2D15B87273D9D9D5B46DADAAD576291B2C2CB7D31A6C
                      SHA-512:B2B444DF48E6D66566CB8E6393825A56D5D86C2E87A282298336B64AA2CF6265DC1DD9F38B9789A463D3BA8F9BDB3F7E74E6CDEFA916849ACBA77B61B094AD75
                      Malicious:false
                      Reputation:low
                      Preview:MDMP..a..... .........Rg........................H...........$....&.......... '......dA..............l.......8...........T............D...............6...........8..............................................................................eJ.......8......Lw......................T.......d...y.Rg.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\System32\WerFault.exe
                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):9120
                      Entropy (8bit):3.713809142870005
                      Encrypted:false
                      SSDEEP:192:R6l7wVeJsbeOl56Y2DQ/gmfZQA8Mprl89bymg2jfcGm:R6lXJbOr6Yd/gmfZyyx2jfE
                      MD5:C172FACC2C631C34A421BA9D2FFFF572
                      SHA1:72C0CD344AB31314180E6CC5FD2C350078CF50CC
                      SHA-256:03F77616937FD2423A1E2C26AD6C91F089E0DA67C6D435EDE6D96E0583EC8B10
                      SHA-512:28A3798A7ADD988EAB1613C23AF8A41E8B267D0469D2E6F140768BCA901FFA8D9DC6EB5D307ABC763930543A8DD41E7D2B2C9B428B67C9C334FA5ECF7127C45C
                      Malicious:false
                      Reputation:low
                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.5.0.0.<./.P.i.
                      Process:C:\Windows\System32\WerFault.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):5018
                      Entropy (8bit):4.585564108203294
                      Encrypted:false
                      SSDEEP:48:cvIwWl8zsZqJg771I9IiGWpW8VYiYm8M4Jtopgu15Fpyq8vagu1mE6BiUSUHd:uIjfiI7WH7VaJtNK9W1KmESvfHd
                      MD5:43EB883497E368582109C1337FBDF72C
                      SHA1:D2B7BACFE30B970CDD69C353249A574430767D7A
                      SHA-256:8B66C4C330236598984AAF9A378ED89140FAC97A9533F8AAAED1645C465937C3
                      SHA-512:3F266CFFBE39E7099446E9CD78709AB49806F66B970BE5EBDC2CC9DDEB51C86EAD2BA4DB37F739C13B881ADB6031E631A44C022F00402D870E2019CF3DECC522
                      Malicious:false
                      Reputation:low
                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="619257" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                      Process:C:\Windows\System32\WerFault.exe
                      File Type:MS Windows registry file, NT/2000 or above
                      Category:dropped
                      Size (bytes):1835008
                      Entropy (8bit):4.469198306835888
                      Encrypted:false
                      SSDEEP:6144:uzZfpi6ceLPx9skLmb0fvZWSP3aJG8nAgeiJRMMhA2zX4WABluuNajDH5S:wZHtvZWOKnMM6bFp4j4
                      MD5:1D8063CB285A7B5FBC275E14765D806D
                      SHA1:198344AEB4BE3547C61D06124598CA52CECB8EF6
                      SHA-256:C1E68BB4EEFCE0C2FA07BE7DB5FAC09EC57B8ED27F7DDA8D08D03A40E9F92DBD
                      SHA-512:2D4974EB415EBDACB7956E58B13FD484CD41F669BFCAFD3F70915923B90F1EBC66DD510CDDDED29BC2C6907E278FDD473408805DCFA3A7A4FD0C6F007BF2AF9F
                      Malicious:false
                      Reputation:low
                      Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.....G...............................................................................................................................................................................................................................................................................................................................................&..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Entropy (8bit):5.609914403824082
                      TrID:
                      • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                      • Win32 Executable (generic) a (10002005/4) 49.75%
                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                      • Windows Screen Saver (13104/52) 0.07%
                      • Generic Win/DOS Executable (2004/3) 0.01%
                      File name:173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe
                      File size:36'864 bytes
                      MD5:b4743a6a5638d49c9f30f552727423b3
                      SHA1:ac26bfe26083f1097a9abb3c5c0d34d6173b10d6
                      SHA256:4a568c15ed2c33916d74ce97eb7fd7b39a3e184c2c637ea7cb7a7a3e1e2e5108
                      SHA512:e9c1dbb0cc60a4aeb9ee48c8d06a040d630ba6a8afbcc4a520e46cc162ba95842be2132da5e98ecda1ed0251799568c80d080da2977a33d8aa3160196ed2ebb2
                      SSDEEP:768:AL13A5Uno9RfHWa2BLTeo8icH1bxbFb9EKOMhyQXve:+xA5Uno9JHWXHeNicH1bBFb9EKOMg6e
                      TLSH:31F24C48BBA04216D9ED6FF5A97372020674D613D917EB4E4CD48ADB6F27BC08D013EA
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Mg................................. ........@.. ....................................@................................
                      Icon Hash:00928e8e8686b000
                      Entrypoint:0x40a5de
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Time Stamp:0x674DD492 [Mon Dec 2 15:38:58 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                      Instruction
                      jmp dword ptr [00402000h]
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0xa5900x4b.text
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xc0000x4d0.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xe0000xc.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x20000x85e40x8600ac228924f28390beeb61bde56a892df0False0.49903801305970147data5.746216076640766IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rsrc0xc0000x4d00x6005fcbb005cb3bd9247736c6d9baa0fd6cFalse0.3736979166666667data3.6919436416194142IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0xe0000xc0x2000a3a083968c42d8366b2de0e8564a094False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_VERSION0xc0a00x23cdata0.47202797202797203
                      RT_MANIFEST0xc2e00x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                      DLLImport
                      mscoree.dll_CorExeMain
                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                      2024-12-06T10:53:20.470318+01002855924ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.64970987.120.116.1791300TCP
                      2024-12-06T10:53:20.859432+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:53:20.913339+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970987.120.116.1791300TCP
                      2024-12-06T10:53:23.012619+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:53:23.012619+01002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:53:33.807978+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:53:33.811007+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970987.120.116.1791300TCP
                      2024-12-06T10:53:46.824653+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:53:46.830354+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970987.120.116.1791300TCP
                      2024-12-06T10:53:52.999772+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:53:52.999772+01002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:54:00.015380+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:54:00.025595+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970987.120.116.1791300TCP
                      2024-12-06T10:54:13.017743+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:54:13.029761+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970987.120.116.1791300TCP
                      2024-12-06T10:54:17.369849+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:54:17.470002+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970987.120.116.1791300TCP
                      2024-12-06T10:54:18.870204+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:54:18.874964+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970987.120.116.1791300TCP
                      2024-12-06T10:54:22.543724+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:54:22.546680+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970987.120.116.1791300TCP
                      2024-12-06T10:54:23.006227+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:54:23.006227+01002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:54:23.223101+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:54:23.224868+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970987.120.116.1791300TCP
                      2024-12-06T10:54:25.741168+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:54:25.743429+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970987.120.116.1791300TCP
                      2024-12-06T10:54:30.660004+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:54:30.662935+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970987.120.116.1791300TCP
                      2024-12-06T10:54:31.276861+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:54:31.281192+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970987.120.116.1791300TCP
                      2024-12-06T10:54:32.365095+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:54:32.367420+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970987.120.116.1791300TCP
                      2024-12-06T10:54:35.605713+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:54:35.609597+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970987.120.116.1791300TCP
                      2024-12-06T10:54:35.859927+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:54:35.862462+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970987.120.116.1791300TCP
                      2024-12-06T10:54:44.656533+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:54:44.659163+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970987.120.116.1791300TCP
                      2024-12-06T10:54:47.283987+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:54:47.295257+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970987.120.116.1791300TCP
                      2024-12-06T10:54:47.476031+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:54:47.482432+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970987.120.116.1791300TCP
                      2024-12-06T10:54:47.607896+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:54:47.610132+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970987.120.116.1791300TCP
                      2024-12-06T10:54:50.480564+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:54:50.483648+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970987.120.116.1791300TCP
                      2024-12-06T10:54:53.036106+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:54:53.036106+01002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:54:54.652876+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:54:54.655059+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970987.120.116.1791300TCP
                      2024-12-06T10:54:55.407907+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:54:55.412215+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970987.120.116.1791300TCP
                      2024-12-06T10:54:57.530420+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:54:57.535709+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970987.120.116.1791300TCP
                      2024-12-06T10:54:59.452325+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:54:59.459333+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970987.120.116.1791300TCP
                      2024-12-06T10:55:02.161487+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:55:02.163481+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970987.120.116.1791300TCP
                      2024-12-06T10:55:07.821410+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:55:07.905385+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970987.120.116.1791300TCP
                      2024-12-06T10:55:07.975265+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:55:08.025501+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970987.120.116.1791300TCP
                      2024-12-06T10:55:08.097254+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:55:08.145400+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970987.120.116.1791300TCP
                      2024-12-06T10:55:08.217398+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.116.1791300192.168.2.649709TCP
                      2024-12-06T10:55:08.265216+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970987.120.116.1791300TCP
                      TimestampSource PortDest PortSource IPDest IP
                      Dec 6, 2024 10:53:06.850649118 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:53:06.970417023 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:53:06.970515013 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:53:07.180315018 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:53:07.300112963 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:53:20.470318079 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:53:20.590065002 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:53:20.859431982 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:53:20.902277946 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:53:20.913338900 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:53:21.033163071 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:53:23.012619019 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:53:23.058593988 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:53:33.418396950 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:53:33.539777994 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:53:33.807977915 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:53:33.811007023 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:53:33.930751085 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:53:46.434525013 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:53:46.554335117 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:53:46.824652910 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:53:46.830353975 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:53:46.950211048 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:53:52.999772072 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:53:53.043112993 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:53:59.624898911 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:53:59.744832993 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:00.015379906 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:00.025594950 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:00.145390987 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:12.621562958 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:12.741523981 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:13.017743111 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:13.029761076 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:13.149547100 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:16.981009960 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:17.100699902 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:17.369848967 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:17.418179989 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:17.470001936 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:17.589875937 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:18.481168985 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:18.600981951 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:18.870203972 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:18.874963999 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:18.994699001 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:22.153013945 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:22.272716999 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:22.543724060 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:22.546679974 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:22.666573048 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:22.824795008 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:22.944569111 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:23.006227016 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:23.058845997 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:23.223100901 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:23.224868059 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:23.344779968 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:25.324821949 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:25.444617033 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:25.741168022 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:25.743428946 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:25.863185883 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:30.123842001 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:30.243628979 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:30.660003901 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:30.662935019 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:30.783260107 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:30.840539932 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:30.960264921 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:31.276860952 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:31.281192064 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:31.400917053 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:31.950340986 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:32.070790052 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:32.365094900 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:32.367419958 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:32.487226963 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:35.197060108 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:35.316759109 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:35.465569973 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:35.585283041 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:35.605712891 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:35.609596968 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:35.772458076 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:35.859926939 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:35.862462044 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:35.982271910 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:44.231354952 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:44.351103067 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:44.656533003 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:44.659162998 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:44.779004097 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:46.871927977 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:46.991662979 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:46.991727114 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:47.111397982 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:47.283987045 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:47.295257092 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:47.415621996 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:47.476031065 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:47.482431889 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:47.602844954 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:47.607896090 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:47.610131979 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:47.772404909 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:50.075989962 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:50.331238985 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:50.480564117 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:50.483648062 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:50.603486061 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:53.036106110 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:53.090287924 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:54.262645960 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:54.382564068 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:54.652875900 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:54.655059099 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:54.776168108 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:55.012562990 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:55.132329941 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:55.407907009 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:55.412214994 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:55.531879902 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:57.137948036 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:57.257891893 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:57.530420065 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:57.535708904 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:57.655432940 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:59.059984922 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:59.179676056 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:59.452325106 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:54:59.459332943 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:54:59.579185009 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:55:01.762281895 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:55:01.881951094 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:55:02.161487103 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:55:02.163480997 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:55:02.283564091 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:55:07.418857098 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:55:07.538594007 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:55:07.538667917 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:55:07.663300037 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:55:07.663364887 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:55:07.783795118 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:55:07.783849001 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:55:07.821409941 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:55:07.871583939 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:55:07.905340910 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:55:07.905385017 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:55:07.975265026 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:55:08.025451899 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:55:08.025501013 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:55:08.097254038 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:55:08.145343065 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:55:08.145400047 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:55:08.217397928 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:55:08.265130997 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:55:08.265216112 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:55:08.337363958 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:55:08.384959936 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:55:08.388326883 CET497091300192.168.2.687.120.116.179
                      Dec 6, 2024 10:55:08.507996082 CET13004970987.120.116.179192.168.2.6
                      Dec 6, 2024 10:55:16.103601933 CET497091300192.168.2.687.120.116.179

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:04:52:57
                      Start date:06/12/2024
                      Path:C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Users\user\Desktop\173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exe"
                      Imagebase:0x710000
                      File size:36'864 bytes
                      MD5 hash:B4743A6A5638D49C9F30F552727423B3
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000000.2093444836.0000000000712000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000000.2093444836.0000000000712000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                      • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.3468154623.0000000002A21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:low
                      Has exited:true

                      Target ID:6
                      Start time:04:55:08
                      Start date:06/12/2024
                      Path:C:\Windows\System32\WerFault.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\WerFault.exe -u -p 6500 -s 1756
                      Imagebase:0x7ff638fe0000
                      File size:570'736 bytes
                      MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:17.9%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:3
                        Total number of Limit Nodes:0
                        execution_graph 4860 7ffd34891be8 4861 7ffd34891bf1 SetWindowsHookExW 4860->4861 4863 7ffd34891cc1 4861->4863

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 7ffd34892a00-7ffd3489a693 2 7ffd3489a695-7ffd3489a6a0 call 7ffd348905c0 0->2 3 7ffd3489a6dd-7ffd3489a6f0 0->3 7 7ffd3489a6a5-7ffd3489a6f0 2->7 4 7ffd3489a766 3->4 5 7ffd3489a6f2-7ffd3489a70f 3->5 8 7ffd3489a76b-7ffd3489a780 4->8 5->8 10 7ffd3489a711-7ffd3489a761 call 7ffd34899530 5->10 7->4 7->5 14 7ffd3489a799-7ffd3489a7ae 8->14 15 7ffd3489a782-7ffd3489a794 call 7ffd348905d0 8->15 34 7ffd3489b339-7ffd3489b347 10->34 22 7ffd3489a7b0-7ffd3489a7dc 14->22 23 7ffd3489a7e1-7ffd3489a7f6 14->23 15->34 22->34 31 7ffd3489a7f8-7ffd3489a804 call 7ffd34898510 23->31 32 7ffd3489a809-7ffd3489a81e 23->32 31->34 40 7ffd3489a820-7ffd3489a823 32->40 41 7ffd3489a864-7ffd3489a879 32->41 40->4 42 7ffd3489a829-7ffd3489a834 40->42 45 7ffd3489a8ba-7ffd3489a8cf 41->45 46 7ffd3489a87b-7ffd3489a87e 41->46 42->4 43 7ffd3489a83a-7ffd3489a85f call 7ffd348905a8 call 7ffd34898510 42->43 43->34 53 7ffd3489a8fc-7ffd3489a911 45->53 54 7ffd3489a8d1-7ffd3489a8d4 45->54 46->4 48 7ffd3489a884-7ffd3489a88f 46->48 48->4 51 7ffd3489a895-7ffd3489a8b5 call 7ffd348905a8 call 7ffd34892a50 48->51 51->34 62 7ffd3489a917-7ffd3489a977 call 7ffd34890530 53->62 63 7ffd3489a9fd-7ffd3489aa12 53->63 54->4 56 7ffd3489a8da-7ffd3489a8f7 call 7ffd348905a8 call 7ffd34892a58 54->56 56->34 62->4 103 7ffd3489a97d-7ffd3489a9b5 call 7ffd34898520 62->103 71 7ffd3489aa31-7ffd3489aa46 63->71 72 7ffd3489aa14-7ffd3489aa17 63->72 81 7ffd3489aa68-7ffd3489aa7d 71->81 82 7ffd3489aa48-7ffd3489aa4b 71->82 72->4 75 7ffd3489aa1d-7ffd3489aa2c call 7ffd34892a30 72->75 75->34 88 7ffd3489aa9d-7ffd3489aab2 81->88 89 7ffd3489aa7f-7ffd3489aa98 81->89 82->4 84 7ffd3489aa51-7ffd3489aa63 call 7ffd34892a30 82->84 84->34 94 7ffd3489aad2-7ffd3489aae7 88->94 95 7ffd3489aab4-7ffd3489aacd 88->95 89->34 100 7ffd3489ab07-7ffd3489ab1c 94->100 101 7ffd3489aae9-7ffd3489ab02 94->101 95->34 107 7ffd3489ab45-7ffd3489ab5a 100->107 108 7ffd3489ab1e-7ffd3489ab21 100->108 101->34 103->4 121 7ffd3489a9bb-7ffd3489a9f8 call 7ffd34898530 103->121 114 7ffd3489abfa-7ffd3489ac0f 107->114 115 7ffd3489ab60-7ffd3489abd8 107->115 108->4 109 7ffd3489ab27-7ffd3489ab40 108->109 109->34 122 7ffd3489ac27-7ffd3489ac3c 114->122 123 7ffd3489ac11-7ffd3489ac22 114->123 115->4 148 7ffd3489abde-7ffd3489abf5 115->148 121->34 130 7ffd3489acdc-7ffd3489acf1 122->130 131 7ffd3489ac42-7ffd3489ac5d 122->131 123->34 140 7ffd3489ad09-7ffd3489ad1e 130->140 141 7ffd3489acf3-7ffd3489ad04 130->141 146 7ffd3489ad20-7ffd3489ad5a call 7ffd34890ec0 call 7ffd34899530 140->146 147 7ffd3489ad5f-7ffd3489ad74 140->147 141->34 146->34 152 7ffd3489ad7a-7ffd3489ae16 call 7ffd34890ec0 call 7ffd34899530 147->152 153 7ffd3489ae1b-7ffd3489ae30 147->153 148->34 152->34 159 7ffd3489ae36-7ffd3489ae39 153->159 160 7ffd3489aebe-7ffd3489aed3 153->160 162 7ffd3489ae3b-7ffd3489ae46 159->162 163 7ffd3489aeb3-7ffd3489aeb8 159->163 169 7ffd3489aed5-7ffd3489aee2 call 7ffd34899530 160->169 170 7ffd3489aee7-7ffd3489aefc 160->170 162->163 166 7ffd3489ae48-7ffd3489aeb1 call 7ffd34890ec0 call 7ffd34899530 162->166 173 7ffd3489aeb9 163->173 166->173 169->34 181 7ffd3489aefe-7ffd3489af38 call 7ffd34890ec0 call 7ffd34899530 170->181 182 7ffd3489af3d-7ffd3489af52 170->182 173->34 181->34 188 7ffd3489af58-7ffd3489af69 182->188 189 7ffd3489afdd-7ffd3489aff2 182->189 188->4 201 7ffd3489af6f-7ffd3489af7f call 7ffd348905a0 188->201 198 7ffd3489b032-7ffd3489b047 189->198 199 7ffd3489aff4-7ffd3489aff7 189->199 209 7ffd3489b049-7ffd3489b053 call 7ffd348991f0 198->209 210 7ffd3489b08d-7ffd3489b0a2 198->210 199->4 203 7ffd3489affd-7ffd3489b02d call 7ffd34890598 call 7ffd348905a8 call 7ffd34892a08 199->203 211 7ffd3489afbb-7ffd3489afd8 call 7ffd348905a0 call 7ffd348905a8 call 7ffd34892a08 201->211 212 7ffd3489af81-7ffd3489afb6 call 7ffd34899530 201->212 203->34 221 7ffd3489b058-7ffd3489b088 call 7ffd348980f0 call 7ffd34892a10 209->221 229 7ffd3489b10c-7ffd3489b121 210->229 230 7ffd3489b0a4-7ffd3489b107 call 7ffd34890ec0 call 7ffd34899530 210->230 211->34 212->34 221->34 229->34 244 7ffd3489b127-7ffd3489b241 call 7ffd34898540 call 7ffd34898550 call 7ffd34898560 call 7ffd34898570 call 7ffd34892140 call 7ffd34898580 call 7ffd34898550 call 7ffd34898560 229->244 230->34 286 7ffd3489b2b2-7ffd3489b2c7 call 7ffd34890ec0 244->286 287 7ffd3489b243-7ffd3489b247 244->287 289 7ffd3489b2c8-7ffd3489b338 call 7ffd348905b0 call 7ffd34899530 286->289 287->289 290 7ffd3489b249-7ffd3489b2a8 call 7ffd34898590 call 7ffd348985a0 287->290 289->34 290->286
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3474552152.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ffd34890000_173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f106.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID: 0-3916222277
                        • Opcode ID: 2ebe0bdc7d3553c613c02e6bdf13272901c99caf7b2ce15c2e63856a3b03fbd8
                        • Instruction ID: 37d5e1b970f25fdd403f2adb08dcec3cb13387f5d539c4c576ba9f5cd84d46cc
                        • Opcode Fuzzy Hash: 2ebe0bdc7d3553c613c02e6bdf13272901c99caf7b2ce15c2e63856a3b03fbd8
                        • Instruction Fuzzy Hash: 7D726230B1890A8FEB98FB7C84A56BD77D6FF9A310B514578D50ED7282DE2CE8429740

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 425 7ffd34892a58-7ffd34892a72 428 7ffd34892aa8-7ffd34892aa9 425->428 429 7ffd34892a74-7ffd34892aa4 425->429 433 7ffd34892aaa-7ffd34892ab2 428->433 429->433 438 7ffd34892aa6 429->438 436 7ffd34892ae8-7ffd34892b02 433->436 437 7ffd34892ab4-7ffd34892ae6 433->437 443 7ffd34892b38-7ffd34892b42 436->443 444 7ffd34892b04-7ffd34892b22 436->444 437->436 438->428 450 7ffd34892b78-7ffd34892b82 443->450 451 7ffd34892b44-7ffd34892b49 443->451 448 7ffd34892b58-7ffd34892b62 444->448 449 7ffd34892b24-7ffd34892b32 444->449 459 7ffd34892b64-7ffd34892b67 448->459 460 7ffd34892b98-7ffd34892bae 448->460 455 7ffd34892b68-7ffd34892b70 449->455 456 7ffd34892b34-7ffd34892b37 449->456 463 7ffd34892bb8-7ffd34892bbe 450->463 464 7ffd34892b84-7ffd34892b87 450->464 458 7ffd34892b4b-7ffd34892b52 451->458 451->459 455->450 456->443 465 7ffd34892b88-7ffd34892b92 458->465 466 7ffd34892b54-7ffd34892b57 458->466 459->455 477 7ffd34892baf-7ffd34892bb7 460->477 474 7ffd34892bc0-7ffd34892bc7 463->474 464->465 475 7ffd34892bc8-7ffd34892bd2 465->475 476 7ffd34892b94-7ffd34892b97 465->476 466->448 474->475 482 7ffd34892c08-7ffd34892c17 475->482 483 7ffd34892bd4-7ffd34892bd9 475->483 476->460 477->463 491 7ffd34892c18-7ffd34892c27 482->491 485 7ffd34892bdb-7ffd34892be0 483->485 486 7ffd34892bf3-7ffd34892bf9 483->486 485->477 488 7ffd34892be2 485->488 488->491 492 7ffd34892be4-7ffd34892bf0 488->492 496 7ffd34892c28-7ffd34892c49 491->496 492->474 494 7ffd34892bf2 492->494 494->486 494->496 500 7ffd34892c4b-7ffd34892c60 496->500 501 7ffd34892c63-7ffd34892c65 496->501 503 7ffd34892c67-7ffd34892cb0 500->503 504 7ffd34892c62 500->504 501->503 508 7ffd34892cbd-7ffd34892d43 503->508 509 7ffd34892cb2-7ffd34892cbc 503->509 504->501 517 7ffd34892d45-7ffd34892d5d 508->517 509->508 518 7ffd34892d68-7ffd34892dc1 call 7ffd34892140 517->518 526 7ffd34892dc8-7ffd34892de9 518->526 528 7ffd34892df0-7ffd34892df9 526->528 529 7ffd34892e06-7ffd34892e0f 528->529 530 7ffd34892e17-7ffd34892e3b 529->530 533 7ffd34892e42-7ffd34892e4f call 7ffd348913b8 530->533 536 7ffd34892e54-7ffd34892e55 533->536 537 7ffd34892e5c-7ffd34892e5f call 7ffd34891408 536->537 539 7ffd34892e64-7ffd34892eaf 537->539 542 7ffd34892eb1-7ffd34892ee0 539->542 543 7ffd34892ee8-7ffd34892eec 542->543 544 7ffd34892efb-7ffd34892f32 543->544 545 7ffd34892eee-7ffd34892ef5 543->545 546 7ffd3489303e 544->546 545->544 545->546 548 7ffd3489303f-7ffd34893049 546->548 552 7ffd3489304b-7ffd3489308b call 7ffd348930cb 548->552
                        Memory Dump Source
                        • Source File: 00000000.00000002.3474552152.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ffd34890000_173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f106.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: cba6fbd2e3e2de064dcb2b5b7abdb9071adb4284bdb0aad7b6fcbe65cc7d69d1
                        • Instruction ID: d239f42fd5f59a4d8cf81cf3c52ae25f119bf760d51209b7b6884a4787b6c60d
                        • Opcode Fuzzy Hash: cba6fbd2e3e2de064dcb2b5b7abdb9071adb4284bdb0aad7b6fcbe65cc7d69d1
                        • Instruction Fuzzy Hash: 77020967B0DA924FE7929B6C54F51E53FA0EF93324B0804B6D289C71D3ED2D780A9391

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 559 7ffd34896961-7ffd348969c7 562 7ffd348969c9-7ffd348969d2 559->562 563 7ffd34896a33 559->563 562->563 564 7ffd348969d4-7ffd348969e0 562->564 565 7ffd34896a35-7ffd34896a5a 563->565 566 7ffd34896a19-7ffd34896a31 564->566 567 7ffd348969e2-7ffd348969f4 564->567 572 7ffd34896ac6 565->572 573 7ffd34896a5c-7ffd34896a65 565->573 566->565 568 7ffd348969f6 567->568 569 7ffd348969f8-7ffd34896a0b 567->569 568->569 569->569 571 7ffd34896a0d-7ffd34896a15 569->571 571->566 575 7ffd34896ac8-7ffd34896b70 572->575 573->572 574 7ffd34896a67-7ffd34896a73 573->574 576 7ffd34896a75-7ffd34896a87 574->576 577 7ffd34896aac-7ffd34896ac4 574->577 586 7ffd34896bde 575->586 587 7ffd34896b72-7ffd34896b7c 575->587 578 7ffd34896a89 576->578 579 7ffd34896a8b-7ffd34896a9e 576->579 577->575 578->579 579->579 581 7ffd34896aa0-7ffd34896aa8 579->581 581->577 589 7ffd34896be0-7ffd34896c09 586->589 587->586 588 7ffd34896b7e-7ffd34896b8b 587->588 590 7ffd34896b8d-7ffd34896b9f 588->590 591 7ffd34896bc4-7ffd34896bdc 588->591 596 7ffd34896c0b-7ffd34896c16 589->596 597 7ffd34896c73 589->597 592 7ffd34896ba1 590->592 593 7ffd34896ba3-7ffd34896bb6 590->593 591->589 592->593 593->593 595 7ffd34896bb8-7ffd34896bc0 593->595 595->591 596->597 599 7ffd34896c18-7ffd34896c26 596->599 598 7ffd34896c75-7ffd34896d06 597->598 607 7ffd34896d0c-7ffd34896d1b 598->607 600 7ffd34896c28-7ffd34896c3a 599->600 601 7ffd34896c5f-7ffd34896c71 599->601 603 7ffd34896c3c 600->603 604 7ffd34896c3e-7ffd34896c51 600->604 601->598 603->604 604->604 605 7ffd34896c53-7ffd34896c5b 604->605 605->601 608 7ffd34896d1d 607->608 609 7ffd34896d23-7ffd34896d80 call 7ffd34896da4 607->609 608->609
                        Memory Dump Source
                        • Source File: 00000000.00000002.3474552152.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ffd34890000_173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f106.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 61452b2643fb7afa6e7535a756df8088bcf68e2e5535058923794ca3ad6b687e
                        • Instruction ID: b2d6bd644fa8bf891f81db6a713afdb686b1579c9d06b15c0238bf7ec250dce6
                        • Opcode Fuzzy Hash: 61452b2643fb7afa6e7535a756df8088bcf68e2e5535058923794ca3ad6b687e
                        • Instruction Fuzzy Hash: 59D16330A18E4D8FEBA8DF28C8557E977D1FB58300F44826EE80DD7295DF78A9458B81

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 687 7ffd34897711-7ffd34897777 690 7ffd34897779-7ffd34897782 687->690 691 7ffd348977e3 687->691 690->691 693 7ffd34897784-7ffd34897790 690->693 692 7ffd348977e5-7ffd3489780a 691->692 700 7ffd34897876 692->700 701 7ffd3489780c-7ffd34897815 692->701 694 7ffd348977c9-7ffd348977e1 693->694 695 7ffd34897792-7ffd348977a4 693->695 694->692 697 7ffd348977a6 695->697 698 7ffd348977a8-7ffd348977bb 695->698 697->698 698->698 699 7ffd348977bd-7ffd348977c5 698->699 699->694 703 7ffd34897878-7ffd3489789d 700->703 701->700 702 7ffd34897817-7ffd34897823 701->702 704 7ffd34897825-7ffd34897837 702->704 705 7ffd3489785c-7ffd34897874 702->705 709 7ffd3489790b 703->709 710 7ffd3489789f-7ffd348978a9 703->710 707 7ffd34897839 704->707 708 7ffd3489783b-7ffd3489784e 704->708 705->703 707->708 708->708 711 7ffd34897850-7ffd34897858 708->711 713 7ffd3489790d-7ffd3489793b 709->713 710->709 712 7ffd348978ab-7ffd348978b8 710->712 711->705 714 7ffd348978ba-7ffd348978cc 712->714 715 7ffd348978f1-7ffd34897909 712->715 720 7ffd348979ab 713->720 721 7ffd3489793d-7ffd34897948 713->721 716 7ffd348978ce 714->716 717 7ffd348978d0-7ffd348978e3 714->717 715->713 716->717 717->717 719 7ffd348978e5-7ffd348978ed 717->719 719->715 722 7ffd348979ad-7ffd34897a85 720->722 721->720 723 7ffd3489794a-7ffd34897958 721->723 733 7ffd34897a8b-7ffd34897a9a 722->733 724 7ffd3489795a-7ffd3489796c 723->724 725 7ffd34897991-7ffd348979a9 723->725 726 7ffd3489796e 724->726 727 7ffd34897970-7ffd34897983 724->727 725->722 726->727 727->727 729 7ffd34897985-7ffd3489798d 727->729 729->725 734 7ffd34897a9c 733->734 735 7ffd34897aa2-7ffd34897afc call 7ffd34897b20 733->735 734->735
                        Memory Dump Source
                        • Source File: 00000000.00000002.3474552152.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ffd34890000_173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f106.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a95e6aea3839ddfc7e47834dbc89b091a2e6d8bd65fce0d323a2b9b6b8e2d966
                        • Instruction ID: 699e69ad3dc35150d950504132caf1f127cf93b69dc6530239be23a929ad7a3f
                        • Opcode Fuzzy Hash: a95e6aea3839ddfc7e47834dbc89b091a2e6d8bd65fce0d323a2b9b6b8e2d966
                        • Instruction Fuzzy Hash: EBD15230A18E4D8FEBA8DF28C8A57E977D1FB58311F14426ED80DC7695DF7899408B81

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 313 7ffd34891be8-7ffd34891bef 314 7ffd34891bfa-7ffd34891c6d 313->314 315 7ffd34891bf1-7ffd34891bf9 313->315 319 7ffd34891cf9-7ffd34891cfd 314->319 320 7ffd34891c73-7ffd34891c78 314->320 315->314 321 7ffd34891c82-7ffd34891cbf SetWindowsHookExW 319->321 322 7ffd34891c7f-7ffd34891c80 320->322 323 7ffd34891cc7-7ffd34891cf8 321->323 324 7ffd34891cc1 321->324 322->321 324->323
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.3474552152.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ffd34890000_173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f106.jbxd
                        Similarity
                        • API ID: HookWindows
                        • String ID:
                        • API String ID: 2559412058-0
                        • Opcode ID: b1b13c417cee684506de27f537bcedb13f97b61234913f5642fcd3678d79046c
                        • Instruction ID: e6368bedd745e84910216b782593a314238491212b13a921d341d08d842de850
                        • Opcode Fuzzy Hash: b1b13c417cee684506de27f537bcedb13f97b61234913f5642fcd3678d79046c
                        • Instruction Fuzzy Hash: 5B410A30A1CA4D4FEB18EF6C98566F97BE1EF5A321F04427ED049D3292CE75A85287C1