Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
HdTSntLSMB.exe

Overview

General Information

Sample name:HdTSntLSMB.exe
renamed because original name is a hash value
Original sample name:e7d77866c1d45436028229fe3ef3fe5f1de7c29241991fc67cc31ad569396959.exe
Analysis ID:1575206
MD5:9574b84144372c196237bc6e5e7d13c8
SHA1:9b3a925c16629f910ebfab7f790b1a303e60e1b2
SHA256:e7d77866c1d45436028229fe3ef3fe5f1de7c29241991fc67cc31ad569396959
Tags:exeuser-Chainskilabs
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for dropped file
Machine Learning detection for sample
Protects its processes via BreakOnTermination flag
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious Schtasks From Env Var Folder
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • HdTSntLSMB.exe (PID: 7132 cmdline: "C:\Users\user\Desktop\HdTSntLSMB.exe" MD5: 9574B84144372C196237BC6E5E7D13C8)
    • schtasks.exe (PID: 5100 cmdline: "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\user\AppData\Roaming\XClient.exe" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • conhost.exe (PID: 1020 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • XClient.exe (PID: 5580 cmdline: C:\Users\user\AppData\Roaming\XClient.exe MD5: 9574B84144372C196237BC6E5E7D13C8)
  • XClient.exe (PID: 7516 cmdline: "C:\Users\user\AppData\Roaming\XClient.exe" MD5: 9574B84144372C196237BC6E5E7D13C8)
  • XClient.exe (PID: 7640 cmdline: "C:\Users\user\AppData\Roaming\XClient.exe" MD5: 9574B84144372C196237BC6E5E7D13C8)
  • XClient.exe (PID: 4024 cmdline: C:\Users\user\AppData\Roaming\XClient.exe MD5: 9574B84144372C196237BC6E5E7D13C8)
  • cleanup
{"C2 url": ["reason-presence.gl.at.ply.gg"], "Port": 49666, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
SourceRuleDescriptionAuthorStrings
HdTSntLSMB.exeJoeSecurity_XWormYara detected XWormJoe Security
    HdTSntLSMB.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0x84bc:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x8559:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x866e:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x8134:$cnc4: POST / HTTP/1.1
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\XClient.exeJoeSecurity_XWormYara detected XWormJoe Security
      C:\Users\user\AppData\Roaming\XClient.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x84bc:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x8559:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x866e:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0x8134:$cnc4: POST / HTTP/1.1
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.2145485090.0000000000EF2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_XWormYara detected XWormJoe Security
        00000000.00000000.2145485090.0000000000EF2000.00000002.00000001.01000000.00000003.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
        • 0x82bc:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
        • 0x8359:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
        • 0x846e:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
        • 0x7f34:$cnc4: POST / HTTP/1.1
        Process Memory Space: HdTSntLSMB.exe PID: 7132JoeSecurity_XWormYara detected XWormJoe Security
          SourceRuleDescriptionAuthorStrings
          0.0.HdTSntLSMB.exe.ef0000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
            0.0.HdTSntLSMB.exe.ef0000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0x84bc:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x8559:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x866e:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x8134:$cnc4: POST / HTTP/1.1

            System Summary

            barindex
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\XClient.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\HdTSntLSMB.exe, ProcessId: 7132, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient
            Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\Desktop\HdTSntLSMB.exe, ProcessId: 7132, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\user\AppData\Roaming\XClient.exe", CommandLine: "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\user\AppData\Roaming\XClient.exe", CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\HdTSntLSMB.exe", ParentImage: C:\Users\user\Desktop\HdTSntLSMB.exe, ParentProcessId: 7132, ParentProcessName: HdTSntLSMB.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\user\AppData\Roaming\XClient.exe", ProcessId: 5100, ProcessName: schtasks.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-14T18:52:47.552426+010028531931Malware Command and Control Activity Detected192.168.2.649955147.185.221.2449666TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: HdTSntLSMB.exeAvira: detected
            Source: reason-presence.gl.at.ply.ggAvira URL Cloud: Label: malware
            Source: C:\Users\user\AppData\Roaming\XClient.exeAvira: detection malicious, Label: TR/Spy.Gen
            Source: HdTSntLSMB.exeMalware Configuration Extractor: Xworm {"C2 url": ["reason-presence.gl.at.ply.gg"], "Port": 49666, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
            Source: C:\Users\user\AppData\Roaming\XClient.exeReversingLabs: Detection: 78%
            Source: HdTSntLSMB.exeReversingLabs: Detection: 78%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Roaming\XClient.exeJoe Sandbox ML: detected
            Source: HdTSntLSMB.exeJoe Sandbox ML: detected
            Source: HdTSntLSMB.exeString decryptor: reason-presence.gl.at.ply.gg
            Source: HdTSntLSMB.exeString decryptor: 49666
            Source: HdTSntLSMB.exeString decryptor: <123456789>
            Source: HdTSntLSMB.exeString decryptor: <Xwormmm>
            Source: HdTSntLSMB.exeString decryptor: XWorm V5.6
            Source: HdTSntLSMB.exeString decryptor: USB.exe
            Source: HdTSntLSMB.exeString decryptor: %AppData%
            Source: HdTSntLSMB.exeString decryptor: XClient.exe
            Source: HdTSntLSMB.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: HdTSntLSMB.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2855924 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.6:49718 -> 147.185.221.24:49666
            Source: Network trafficSuricata IDS: 2853193 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.6:49955 -> 147.185.221.24:49666
            Source: Malware configuration extractorURLs: reason-presence.gl.at.ply.gg
            Source: global trafficTCP traffic: 192.168.2.6:49718 -> 147.185.221.24:49666
            Source: Joe Sandbox ViewIP Address: 147.185.221.24 147.185.221.24
            Source: Joe Sandbox ViewASN Name: SALSGIVERUS SALSGIVERUS
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficDNS traffic detected: DNS query: reason-presence.gl.at.ply.gg
            Source: HdTSntLSMB.exe, 00000000.00000002.4603636720.00000000031C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: HdTSntLSMB.exe, XLogger.cs.Net Code: KeyboardLayout
            Source: XClient.exe.0.dr, XLogger.cs.Net Code: KeyboardLayout

            Operating System Destruction

            barindex
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: 01 00 00 00 Jump to behavior

            System Summary

            barindex
            Source: HdTSntLSMB.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 0.0.HdTSntLSMB.exe.ef0000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000000.00000000.2145485090.0000000000EF2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: C:\Users\user\AppData\Roaming\XClient.exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeCode function: 0_2_00007FFD346D88720_2_00007FFD346D8872
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeCode function: 0_2_00007FFD346D146D0_2_00007FFD346D146D
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeCode function: 0_2_00007FFD346D7AC60_2_00007FFD346D7AC6
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeCode function: 0_2_00007FFD346D44FB0_2_00007FFD346D44FB
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeCode function: 0_2_00007FFD346D1C590_2_00007FFD346D1C59
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 5_2_00007FFD346E1C595_2_00007FFD346E1C59
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 5_2_00007FFD346E146D5_2_00007FFD346E146D
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 9_2_00007FFD346F1C599_2_00007FFD346F1C59
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 9_2_00007FFD346F146D9_2_00007FFD346F146D
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 10_2_00007FFD346E1C5910_2_00007FFD346E1C59
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 10_2_00007FFD346E146D10_2_00007FFD346E146D
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 16_2_00007FFD346E1C5916_2_00007FFD346E1C59
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 16_2_00007FFD346E146D16_2_00007FFD346E146D
            Source: HdTSntLSMB.exe, 00000000.00000000.2145485090.0000000000EF2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameXClient.exe4 vs HdTSntLSMB.exe
            Source: HdTSntLSMB.exeBinary or memory string: OriginalFilenameXClient.exe4 vs HdTSntLSMB.exe
            Source: HdTSntLSMB.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: HdTSntLSMB.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 0.0.HdTSntLSMB.exe.ef0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000000.00000000.2145485090.0000000000EF2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: C:\Users\user\AppData\Roaming\XClient.exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: HdTSntLSMB.exe, Helper.csCryptographic APIs: 'TransformFinalBlock'
            Source: HdTSntLSMB.exe, Helper.csCryptographic APIs: 'TransformFinalBlock'
            Source: HdTSntLSMB.exe, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
            Source: XClient.exe.0.dr, Helper.csCryptographic APIs: 'TransformFinalBlock'
            Source: XClient.exe.0.dr, Helper.csCryptographic APIs: 'TransformFinalBlock'
            Source: XClient.exe.0.dr, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
            Source: XClient.exe.0.dr, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: XClient.exe.0.dr, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: HdTSntLSMB.exe, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: HdTSntLSMB.exe, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@8/4@1/1
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeFile created: C:\Users\user\AppData\Roaming\XClient.exeJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeMutant created: NULL
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeMutant created: \Sessions\1\BaseNamedObjects\PD29o09mL0QxVKvZ
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1020:120:WilError_03
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeFile created: C:\Users\user\AppData\Local\Temp\Log.tmpJump to behavior
            Source: HdTSntLSMB.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: HdTSntLSMB.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: HdTSntLSMB.exeReversingLabs: Detection: 78%
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeFile read: C:\Users\user\Desktop\HdTSntLSMB.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\HdTSntLSMB.exe "C:\Users\user\Desktop\HdTSntLSMB.exe"
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\user\AppData\Roaming\XClient.exe"
            Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\XClient.exe C:\Users\user\AppData\Roaming\XClient.exe
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\XClient.exe "C:\Users\user\AppData\Roaming\XClient.exe"
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\XClient.exe "C:\Users\user\AppData\Roaming\XClient.exe"
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\XClient.exe C:\Users\user\AppData\Roaming\XClient.exe
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\user\AppData\Roaming\XClient.exe"Jump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: scrrun.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: linkinfo.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: ntshrui.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: cscapi.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: avicap32.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: msvfw32.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{5E5F29CE-E0A8-49D3-AF32-7A7BDC173478}\InProcServer32Jump to behavior
            Source: XClient.lnk.0.drLNK file: ..\..\..\..\..\XClient.exe
            Source: HdTSntLSMB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: HdTSntLSMB.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: HdTSntLSMB.exe, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: HdTSntLSMB.exe, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: XClient.exe.0.dr, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: XClient.exe.0.dr, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: HdTSntLSMB.exe, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
            Source: HdTSntLSMB.exe, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
            Source: HdTSntLSMB.exe, Messages.cs.Net Code: Memory
            Source: XClient.exe.0.dr, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
            Source: XClient.exe.0.dr, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
            Source: XClient.exe.0.dr, Messages.cs.Net Code: Memory
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeCode function: 0_2_00007FFD346D213D push E95D313Fh; iretd 0_2_00007FFD346D2189
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 5_2_00007FFD346E05A0 push ebx; retf FFEFh5_2_00007FFD346E062A
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 9_2_00007FFD346F05A0 push ebx; retf FFEFh9_2_00007FFD346F062A
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 10_2_00007FFD346E05A0 push ebx; retf FFEFh10_2_00007FFD346E062A
            Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 16_2_00007FFD346E05A0 push ebx; retf FFEFh16_2_00007FFD346E062A
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeFile created: C:\Users\user\AppData\Roaming\XClient.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\user\AppData\Roaming\XClient.exe"
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnkJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnkJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run XClientJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run XClientJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeMemory allocated: 1350000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeMemory allocated: 1B1C0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeMemory allocated: 1520000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeMemory allocated: 1AF50000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeMemory allocated: 760000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeMemory allocated: 1A380000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeMemory allocated: 2C90000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeMemory allocated: 1AD50000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeMemory allocated: 1500000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeMemory allocated: 1AF30000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeWindow / User API: threadDelayed 8412Jump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeWindow / User API: threadDelayed 1433Jump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exe TID: 5272Thread sleep time: -4611686018427385s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exe TID: 1016Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exe TID: 7536Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exe TID: 7660Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exe TID: 7416Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeFile Volume queried: unknown FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeFile Volume queried: unknown FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeFile Volume queried: unknown FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeFile Volume queried: unknown FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeFile Volume queried: unknown FullSizeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: HdTSntLSMB.exe, 00000000.00000002.4606300782.000000001C1C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\user\AppData\Roaming\XClient.exe"Jump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeQueries volume information: C:\Users\user\Desktop\HdTSntLSMB.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeQueries volume information: C:\Users\user\AppData\Roaming\XClient.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeQueries volume information: C:\Users\user\AppData\Roaming\XClient.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeQueries volume information: C:\Users\user\AppData\Roaming\XClient.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\XClient.exeQueries volume information: C:\Users\user\AppData\Roaming\XClient.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: HdTSntLSMB.exe, 00000000.00000002.4606300782.000000001C1C4000.00000004.00000020.00020000.00000000.sdmp, HdTSntLSMB.exe, 00000000.00000002.4602922730.00000000013C0000.00000004.00000020.00020000.00000000.sdmp, HdTSntLSMB.exe, 00000000.00000002.4607093893.000000001CDA0000.00000004.00000020.00020000.00000000.sdmp, HdTSntLSMB.exe, 00000000.00000002.4606300782.000000001C207000.00000004.00000020.00020000.00000000.sdmp, HdTSntLSMB.exe, 00000000.00000002.4606300782.000000001C170000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\Desktop\HdTSntLSMB.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: HdTSntLSMB.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.HdTSntLSMB.exe.ef0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.2145485090.0000000000EF2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: HdTSntLSMB.exe PID: 7132, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\XClient.exe, type: DROPPED

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: HdTSntLSMB.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.HdTSntLSMB.exe.ef0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.2145485090.0000000000EF2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: HdTSntLSMB.exe PID: 7132, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\XClient.exe, type: DROPPED
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
            Windows Management Instrumentation
            1
            Scheduled Task/Job
            11
            Process Injection
            1
            Masquerading
            1
            Input Capture
            221
            Security Software Discovery
            Remote Services1
            Input Capture
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Scheduled Task/Job
            21
            Registry Run Keys / Startup Folder
            1
            Scheduled Task/Job
            1
            Disable or Modify Tools
            LSASS Memory1
            Process Discovery
            Remote Desktop Protocol11
            Archive Collected Data
            1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAt1
            DLL Side-Loading
            21
            Registry Run Keys / Startup Folder
            131
            Virtualization/Sandbox Evasion
            Security Account Manager131
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive1
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            DLL Side-Loading
            11
            Process Injection
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput Capture11
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets1
            File and Directory Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Obfuscated Files or Information
            Cached Domain Credentials13
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
            Software Packing
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            HdTSntLSMB.exe79%ReversingLabsWin32.Exploit.Xworm
            HdTSntLSMB.exe100%AviraTR/Spy.Gen
            HdTSntLSMB.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\XClient.exe100%AviraTR/Spy.Gen
            C:\Users\user\AppData\Roaming\XClient.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Roaming\XClient.exe79%ReversingLabsWin32.Exploit.Xworm
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            reason-presence.gl.at.ply.gg100%Avira URL Cloudmalware
            NameIPActiveMaliciousAntivirus DetectionReputation
            reason-presence.gl.at.ply.gg
            147.185.221.24
            truetrue
              unknown
              NameMaliciousAntivirus DetectionReputation
              reason-presence.gl.at.ply.ggtrue
              • Avira URL Cloud: malware
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameHdTSntLSMB.exe, 00000000.00000002.4603636720.00000000031C1000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                147.185.221.24
                reason-presence.gl.at.ply.ggUnited States
                12087SALSGIVERUStrue
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1575206
                Start date and time:2024-12-14 18:50:08 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 7m 24s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:18
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Sample name:HdTSntLSMB.exe
                renamed because original name is a hash value
                Original Sample Name:e7d77866c1d45436028229fe3ef3fe5f1de7c29241991fc67cc31ad569396959.exe
                Detection:MAL
                Classification:mal100.troj.spyw.evad.winEXE@8/4@1/1
                EGA Information:
                • Successful, ratio: 20%
                HCA Information:
                • Successful, ratio: 99%
                • Number of executed functions: 38
                • Number of non-executed functions: 1
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Override analysis time to 240000 for current running targets taking high CPU consumption
                • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                • Excluded IPs from analysis (whitelisted): 20.190.147.0, 20.103.156.88, 13.107.246.63, 2.16.158.49, 20.234.120.54, 4.245.163.56, 20.223.35.26, 150.171.27.10, 2.16.158.56, 23.218.208.109
                • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, tse1.mm.bing.net, g.bing.com, arc.msn.com, fe3cr.delivery.mp.microsoft.com, ris.api.iris.microsoft.com, ocsp.digicert.com, login.live.com
                • Execution Graph export aborted for target XClient.exe, PID 4024 because it is empty
                • Execution Graph export aborted for target XClient.exe, PID 5580 because it is empty
                • Execution Graph export aborted for target XClient.exe, PID 7516 because it is empty
                • Execution Graph export aborted for target XClient.exe, PID 7640 because it is empty
                • Not all processes where analyzed, report is missing behavior information
                • Report size exceeded maximum capacity and may have missing behavior information.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • VT rate limit hit for: HdTSntLSMB.exe
                TimeTypeDescription
                12:51:06API Interceptor11311140x Sleep call for process: HdTSntLSMB.exe modified
                18:51:06Task SchedulerRun new task: XClient path: C:\Users\user\AppData\Roaming\XClient.exe
                18:51:09AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run XClient C:\Users\user\AppData\Roaming\XClient.exe
                18:51:17AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run XClient C:\Users\user\AppData\Roaming\XClient.exe
                18:51:26AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                147.185.221.24file.exeGet hashmaliciousXWormBrowse
                  file.exeGet hashmaliciousXWormBrowse
                    NhoqAfkhHL.batGet hashmaliciousUnknownBrowse
                      a4lIk1Jrla.exeGet hashmaliciousNjrat, RevengeRATBrowse
                        W6s1vzcRdj.exeGet hashmaliciousXWormBrowse
                          u7e3vb5dfk.exeGet hashmaliciousXWormBrowse
                            aOi4JyF92S.exeGet hashmaliciousXWormBrowse
                              PG4w1WB9dE.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                a4BE6gJooT.exeGet hashmaliciousXWormBrowse
                                  grK0Oh8p4Z.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    SALSGIVERUS7laJ4zKd8O.exeGet hashmaliciousXWormBrowse
                                    • 147.185.221.18
                                    file.exeGet hashmaliciousXWormBrowse
                                    • 147.185.221.24
                                    testingg.exeGet hashmaliciousNjratBrowse
                                    • 147.185.221.19
                                    Bloxflip Predictor.exeGet hashmaliciousNjratBrowse
                                    • 147.185.221.224
                                    system404.exeGet hashmaliciousMetasploitBrowse
                                    • 147.185.221.19
                                    Discord.exeGet hashmaliciousAsyncRATBrowse
                                    • 147.185.221.18
                                    CVmkXJ7e0a.exeGet hashmaliciousSheetRatBrowse
                                    • 147.185.221.22
                                    file.exeGet hashmaliciousXWormBrowse
                                    • 147.185.221.24
                                    NhoqAfkhHL.batGet hashmaliciousUnknownBrowse
                                    • 147.185.221.24
                                    sora.mpsl.elfGet hashmaliciousMiraiBrowse
                                    • 147.160.103.28
                                    No context
                                    No context
                                    Process:C:\Users\user\AppData\Roaming\XClient.exe
                                    File Type:CSV text
                                    Category:dropped
                                    Size (bytes):654
                                    Entropy (8bit):5.380476433908377
                                    Encrypted:false
                                    SSDEEP:12:Q3La/KDLI4MWuPXcp1OKbbDLI4MWuPOKfSSI6Khap+92n4MNQp3/VXM5gXu9tv:ML9E4KQwKDE4KGKZI6Kh6+84xp3/VclT
                                    MD5:30E4BDFC34907D0E4D11152CAEBE27FA
                                    SHA1:825402D6B151041BA01C5117387228EC9B7168BF
                                    SHA-256:A7B8F7FFB4822570DB1423D61ED74D7F4B538CE73521CC8745BC6B131C18BE63
                                    SHA-512:89FBCBCDB0BE5AD7A95685CF9AA4330D5B0250440E67DC40C6642260E024F52A402E9381F534A9824D2541B98B02094178A15BF2320148432EDB0D09B5F972BA
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\04de61553901f06e2f763b6f03a6f65a\Microsoft.VisualBasic.ni.dll",0..
                                    Process:C:\Users\user\Desktop\HdTSntLSMB.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):41
                                    Entropy (8bit):3.7195394315431693
                                    Encrypted:false
                                    SSDEEP:3:rRSFYJKXzovNsr4rNrn:EFYJKDoWrcBn
                                    MD5:0DB526D48DAB0E640663E4DC0EFE82BA
                                    SHA1:17AC435DAFEA6FF9F4D6F83FA6C54F9800F43724
                                    SHA-256:934290A76F9E1804069D8ED6515B14101D9D8ABA2EACBF5B260F59941C65340E
                                    SHA-512:FACD013E1B5B8163214CA8C3A18ADEEC3541153CD69240EEFA76DDD54809186E919C1D635AEA648A8641DE7C3216BEC11C41F04719B60F07EDFDC01FF79027B9
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview:....### explorer ###..[WIN]r[WIN]r[WIN]r
                                    Process:C:\Users\user\Desktop\HdTSntLSMB.exe
                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sat Dec 14 16:51:06 2024, mtime=Sat Dec 14 16:51:06 2024, atime=Sat Dec 14 16:51:06 2024, length=39936, window=hide
                                    Category:dropped
                                    Size (bytes):767
                                    Entropy (8bit):5.058074424762901
                                    Encrypted:false
                                    SSDEEP:12:8hlK244pnu8ChklXIsY//UFB0L72B50rjAes+HkOHxfmV:8hlMgDJlXU8nWRAesFOJm
                                    MD5:F3B3E260F1BCBC5BE70E7F3470EB816D
                                    SHA1:A2092D02F6E8614CAEFF73548F505EB8FD87AD2E
                                    SHA-256:66F2054545DC5DA8F155C07B7312C3A4B0DB1A117CA6D8858A5961A7DBA15635
                                    SHA-512:B6CA2AEE53D5E32052EDB0706E57A2B4A5DF9E05CD92E857C1811ADA7224643CAEF1B65DBE4BE3DA521C184B9C89C675416720C5D8BB35CEEE3A27E17B26703F
                                    Malicious:false
                                    Reputation:low
                                    Preview:L..................F.... ....*.PN...*.PN...*.PN..........................v.:..DG..Yr?.D..U..k0.&...&.......$..S....0..PN..1.+.PN......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2.Y`............................^.A.p.p.D.a.t.a...B.V.1......Y\...Roaming.@......EW<2.Y\...../......................^$.R.o.a.m.i.n.g.....b.2......Yd. .XClient.exe.H......Yd..Yd...........................<#).X.C.l.i.e.n.t...e.x.e.......\...............-.......[...................C:\Users\user\AppData\Roaming\XClient.exe........\.....\.....\.....\.....\.X.C.l.i.e.n.t...e.x.e.`.......X.......142233...........hT..CrF.f4... .....Jc...-...-$..hT..CrF.f4... .....Jc...-...-$.E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                    Process:C:\Users\user\Desktop\HdTSntLSMB.exe
                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Category:dropped
                                    Size (bytes):39936
                                    Entropy (8bit):5.583683609908372
                                    Encrypted:false
                                    SSDEEP:768:9mz6nA3MxG5g8y5AcksKyJjL77FWPa9X4cOwhlaG8k:926nUuf5A72Fv9XBOwnT8k
                                    MD5:9574B84144372C196237BC6E5E7D13C8
                                    SHA1:9B3A925C16629F910EBFAB7F790B1A303E60E1B2
                                    SHA-256:E7D77866C1D45436028229FE3EF3FE5F1DE7C29241991FC67CC31AD569396959
                                    SHA-512:05E80FC9BC0383709065D4A8C85FB9868626F4C21C0EFA01FBB7FBD8CA191D7250A6C4DBE022E9C533CCBE22C7EBB3C3663CED65C4E475E248A844A3BA2FEBFB
                                    Malicious:true
                                    Yara Hits:
                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Roaming\XClient.exe, Author: Joe Security
                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Roaming\XClient.exe, Author: ditekSHen
                                    Antivirus:
                                    • Antivirus: Avira, Detection: 100%
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    • Antivirus: ReversingLabs, Detection: 79%
                                    Reputation:low
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...-D]g................................. ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B.......................H........Y...V............................................................(....*..(....*.s.........s.........s.........s.........*...0..........~....o.....+..*..0..........~....o.....+..*..0..........~....o.....+..*..0..........~....o.....+..*..0............(....(.....+..*....0...........(.....+..*..0...............(.....+..*..0...........(.....+..*..0................-.(...+.+.+...+..*.0.........................*..(....*.0.. .......~.........-.(...+.....~.....+..*..(....*.0..
                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):5.583683609908372
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Windows Screen Saver (13104/52) 0.07%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    File name:HdTSntLSMB.exe
                                    File size:39'936 bytes
                                    MD5:9574b84144372c196237bc6e5e7d13c8
                                    SHA1:9b3a925c16629f910ebfab7f790b1a303e60e1b2
                                    SHA256:e7d77866c1d45436028229fe3ef3fe5f1de7c29241991fc67cc31ad569396959
                                    SHA512:05e80fc9bc0383709065d4a8c85fb9868626f4c21c0efa01fbb7fbd8ca191d7250a6c4dbe022e9c533ccbe22c7ebb3c3663ced65c4e475e248a844a3ba2febfb
                                    SSDEEP:768:9mz6nA3MxG5g8y5AcksKyJjL77FWPa9X4cOwhlaG8k:926nUuf5A72Fv9XBOwnT8k
                                    TLSH:D0034C887BD44222DAFE6BFA59B372060730F6078D13DB5E4CD4899A5B27BC48A05396
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...-D]g................................. ........@.. ....................................@................................
                                    Icon Hash:00928e8e8686b000
                                    Entrypoint:0x40b10e
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x675D442D [Sat Dec 14 08:39:09 2024 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xb0bc0x4f.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xc0000x4d8.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xe0000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000x91140x9200f5f0f2a87c044387d3a11ac35759c39fFalse0.4946222174657534data5.707585347597108IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rsrc0xc0000x4d80x6002472af5ddbb53779b7381f16b8b9407bFalse0.3756510416666667data3.7216503306685733IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0xe0000xc0x200f6802faec724caec52208d5f57381d6fFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_VERSION0xc0a00x244data0.4724137931034483
                                    RT_MANIFEST0xc2e80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                    2024-12-14T18:51:19.015616+01002855924ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.649718147.185.221.2449666TCP
                                    2024-12-14T18:52:47.552426+01002853193ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.649955147.185.221.2449666TCP
                                    TimestampSource PortDest PortSource IPDest IP
                                    Dec 14, 2024 18:51:08.393984079 CET4971849666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:51:08.513974905 CET4966649718147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:51:08.514081955 CET4971849666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:51:08.664908886 CET4971849666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:51:08.784866095 CET4966649718147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:51:19.015615940 CET4971849666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:51:19.139061928 CET4966649718147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:51:29.371531010 CET4971849666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:51:29.659204006 CET4966649718147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:51:30.401415110 CET4966649718147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:51:30.401628017 CET4971849666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:51:34.119172096 CET4971849666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:51:34.120187044 CET4978749666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:51:34.241184950 CET4966649718147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:51:34.242114067 CET4966649787147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:51:34.242172956 CET4978749666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:51:34.327212095 CET4978749666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:51:34.448414087 CET4966649787147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:51:48.431545019 CET4978749666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:51:48.562452078 CET4966649787147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:51:56.135447025 CET4966649787147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:51:56.135545969 CET4978749666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:51:56.728085995 CET4978749666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:51:56.730427980 CET4984849666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:51:56.849107981 CET4966649787147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:51:56.851541996 CET4966649848147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:51:56.851629019 CET4984849666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:51:56.881993055 CET4984849666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:51:57.008663893 CET4966649848147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:52:09.431942940 CET4984849666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:52:09.558758974 CET4966649848147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:52:16.603140116 CET4984849666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:52:16.752824068 CET4966649848147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:52:18.760512114 CET4966649848147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:52:18.760598898 CET4984849666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:52:21.634426117 CET4984849666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:52:21.649774075 CET4990549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:52:21.754369020 CET4966649848147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:52:21.769614935 CET4966649905147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:52:21.770627022 CET4990549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:52:21.865057945 CET4990549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:52:21.993803978 CET4966649905147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:52:32.650142908 CET4990549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:52:32.769920111 CET4966649905147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:52:32.769989014 CET4990549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:52:32.890276909 CET4966649905147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:52:35.121891975 CET4990549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:52:35.243335962 CET4966649905147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:52:37.743983984 CET4990549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:52:37.865029097 CET4966649905147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:52:38.020952940 CET4990549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:52:38.140887976 CET4966649905147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:52:38.141180038 CET4990549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:52:38.264452934 CET4966649905147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:52:41.399739027 CET4990549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:52:41.519903898 CET4966649905147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:52:43.714006901 CET4966649905147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:52:43.714107037 CET4990549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:52:43.714246988 CET4990549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:52:43.716351986 CET4995549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:52:43.834038019 CET4966649905147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:52:43.847424984 CET4966649955147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:52:43.847825050 CET4995549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:52:43.909112930 CET4995549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:52:44.031657934 CET4966649955147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:52:44.031713009 CET4995549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:52:44.152004957 CET4966649955147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:52:47.431042910 CET4995549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:52:47.552242994 CET4966649955147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:52:47.552426100 CET4995549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:52:47.673017025 CET4966649955147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:52:54.274962902 CET4995549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:52:54.397881985 CET4966649955147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:53:04.634839058 CET4995549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:53:04.758693933 CET4966649955147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:53:04.758742094 CET4995549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:53:04.885648012 CET4966649955147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:53:04.885749102 CET4995549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:53:05.019445896 CET4966649955147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:53:05.019582033 CET4995549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:53:05.139427900 CET4966649955147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:53:05.149645090 CET4995549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:53:05.269536018 CET4966649955147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:53:05.844636917 CET4966649955147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:53:05.844757080 CET4995549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:53:10.274679899 CET4995549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:53:10.277878046 CET5001249666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:53:10.396054983 CET4966649955147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:53:10.398631096 CET4966650012147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:53:10.398750067 CET5001249666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:53:10.452677965 CET5001249666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:53:10.572671890 CET4966650012147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:53:18.477699041 CET5001249666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:53:18.597501040 CET4966650012147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:53:29.274475098 CET5001249666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:53:29.397861958 CET4966650012147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:53:30.946647882 CET5001249666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:53:31.073219061 CET4966650012147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:53:32.307975054 CET4966650012147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:53:32.308046103 CET5001249666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:53:36.415360928 CET5001249666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:53:36.420303106 CET5001449666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:53:36.535161018 CET4966650012147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:53:36.540169954 CET4966650014147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:53:36.540319920 CET5001449666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:53:36.584278107 CET5001449666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:53:36.704468966 CET4966650014147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:53:38.430659056 CET5001449666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:53:38.554255962 CET4966650014147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:53:46.961903095 CET5001449666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:53:47.088430882 CET4966650014147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:53:47.088511944 CET5001449666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:53:47.208678961 CET4966650014147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:53:52.602638006 CET5001449666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:53:52.722278118 CET4966650014147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:53:58.433293104 CET4966650014147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:53:58.433367014 CET5001449666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:02.477274895 CET5001449666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:02.479211092 CET5001549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:02.650614023 CET4966650014147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:54:02.650635004 CET4966650015147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:54:02.650724888 CET5001549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:02.776307106 CET5001549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:02.896266937 CET4966650015147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:54:02.946438074 CET5001549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:03.066201925 CET4966650015147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:54:07.711966991 CET5001549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:07.831732988 CET4966650015147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:54:08.055788994 CET5001549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:08.181346893 CET4966650015147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:54:08.539993048 CET5001549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:08.659796000 CET4966650015147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:54:08.659877062 CET5001549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:08.780927896 CET4966650015147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:54:08.780993938 CET5001549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:08.905941010 CET4966650015147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:54:08.905998945 CET5001549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:09.031164885 CET4966650015147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:54:10.914908886 CET5001549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:11.041838884 CET4966650015147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:54:11.042088985 CET5001549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:11.168869972 CET4966650015147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:54:11.743586063 CET5001549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:11.864028931 CET4966650015147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:54:24.558594942 CET4966650015147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:54:24.558681965 CET5001549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:29.342103958 CET5001549666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:29.344049931 CET5001649666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:29.462095022 CET4966650015147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:54:29.463934898 CET4966650016147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:54:29.464025021 CET5001649666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:29.595743895 CET5001649666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:29.715859890 CET4966650016147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:54:29.715919971 CET5001649666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:29.840846062 CET4966650016147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:54:29.840914965 CET5001649666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:29.969137907 CET4966650016147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:54:40.383426905 CET5001649666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:40.504309893 CET4966650016147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:54:45.164814949 CET5001649666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:45.289746046 CET4966650016147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:54:45.290214062 CET5001649666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:45.411047935 CET4966650016147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:54:50.742628098 CET5001649666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:50.863384962 CET4966650016147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:54:51.387438059 CET4966650016147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:54:51.387500048 CET5001649666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:55.867496967 CET5001649666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:55.869998932 CET5001749666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:55.991367102 CET4966650016147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:54:55.993527889 CET4966650017147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:54:55.993607998 CET5001749666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:56.030831099 CET5001749666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:56.155888081 CET4966650017147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:54:56.161012888 CET5001749666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:56.286123991 CET4966650017147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:54:57.586361885 CET5001749666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:54:57.722165108 CET4966650017147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:55:01.602034092 CET5001749666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:55:01.722148895 CET4966650017147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:55:01.722433090 CET5001749666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:55:01.843637943 CET4966650017147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:55:01.843723059 CET5001749666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:55:01.964124918 CET4966650017147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:55:01.964195967 CET5001749666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:55:02.089989901 CET4966650017147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:55:02.090137959 CET5001749666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:55:02.216674089 CET4966650017147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:55:03.136931896 CET5001749666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:55:03.263720989 CET4966650017147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:55:09.117533922 CET5001749666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:55:09.240226030 CET4966650017147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:55:17.902982950 CET4966650017147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:55:17.903278112 CET5001749666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:55:26.336210012 CET5001749666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:55:26.337352991 CET5001949666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:55:26.456207991 CET4966650017147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:55:26.457156897 CET4966650019147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:55:26.460889101 CET5001949666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:55:26.549067974 CET5001949666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:55:26.673261881 CET4966650019147.185.221.24192.168.2.6
                                    Dec 14, 2024 18:55:36.836199045 CET5001949666192.168.2.6147.185.221.24
                                    Dec 14, 2024 18:55:36.956739902 CET4966650019147.185.221.24192.168.2.6
                                    TimestampSource PortDest PortSource IPDest IP
                                    Dec 14, 2024 18:51:08.128540993 CET6490653192.168.2.61.1.1.1
                                    Dec 14, 2024 18:51:08.384177923 CET53649061.1.1.1192.168.2.6
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Dec 14, 2024 18:51:08.128540993 CET192.168.2.61.1.1.10x5d32Standard query (0)reason-presence.gl.at.ply.ggA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Dec 14, 2024 18:51:08.384177923 CET1.1.1.1192.168.2.60x5d32No error (0)reason-presence.gl.at.ply.gg147.185.221.24A (IP address)IN (0x0001)false

                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:12:51:01
                                    Start date:14/12/2024
                                    Path:C:\Users\user\Desktop\HdTSntLSMB.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Users\user\Desktop\HdTSntLSMB.exe"
                                    Imagebase:0xef0000
                                    File size:39'936 bytes
                                    MD5 hash:9574B84144372C196237BC6E5E7D13C8
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000000.2145485090.0000000000EF2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000000.2145485090.0000000000EF2000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                    Reputation:low
                                    Has exited:false

                                    Target ID:3
                                    Start time:12:51:06
                                    Start date:14/12/2024
                                    Path:C:\Windows\System32\schtasks.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\user\AppData\Roaming\XClient.exe"
                                    Imagebase:0x7ff71d450000
                                    File size:235'008 bytes
                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:4
                                    Start time:12:51:06
                                    Start date:14/12/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff66e660000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:5
                                    Start time:12:51:06
                                    Start date:14/12/2024
                                    Path:C:\Users\user\AppData\Roaming\XClient.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Users\user\AppData\Roaming\XClient.exe
                                    Imagebase:0xde0000
                                    File size:39'936 bytes
                                    MD5 hash:9574B84144372C196237BC6E5E7D13C8
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Roaming\XClient.exe, Author: Joe Security
                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Roaming\XClient.exe, Author: ditekSHen
                                    Antivirus matches:
                                    • Detection: 100%, Avira
                                    • Detection: 100%, Joe Sandbox ML
                                    • Detection: 79%, ReversingLabs
                                    Reputation:low
                                    Has exited:true

                                    Target ID:9
                                    Start time:12:51:17
                                    Start date:14/12/2024
                                    Path:C:\Users\user\AppData\Roaming\XClient.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Users\user\AppData\Roaming\XClient.exe"
                                    Imagebase:0x120000
                                    File size:39'936 bytes
                                    MD5 hash:9574B84144372C196237BC6E5E7D13C8
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Target ID:10
                                    Start time:12:51:26
                                    Start date:14/12/2024
                                    Path:C:\Users\user\AppData\Roaming\XClient.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Users\user\AppData\Roaming\XClient.exe"
                                    Imagebase:0xba0000
                                    File size:39'936 bytes
                                    MD5 hash:9574B84144372C196237BC6E5E7D13C8
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Target ID:16
                                    Start time:12:52:01
                                    Start date:14/12/2024
                                    Path:C:\Users\user\AppData\Roaming\XClient.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Users\user\AppData\Roaming\XClient.exe
                                    Imagebase:0xcc0000
                                    File size:39'936 bytes
                                    MD5 hash:9574B84144372C196237BC6E5E7D13C8
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:21.5%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:6
                                      Total number of Limit Nodes:0
                                      execution_graph 4132 7ffd346d2c08 4133 7ffd346d2c11 SetWindowsHookExW 4132->4133 4135 7ffd346d2ce1 4133->4135 4136 7ffd346d26dd 4137 7ffd346d270f RtlSetProcessIsCritical 4136->4137 4139 7ffd346d27c2 4137->4139

                                      Control-flow Graph

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4607616738.00007FFD346D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd346d0000_HdTSntLSMB.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: CAO_^
                                      • API String ID: 0-3111533842
                                      • Opcode ID: abb66450d73c1374ca4fb5c8958eb31f31a598fefbef32b933a31298f7ecb0d9
                                      • Instruction ID: 0c8eedbbcfb01c90f115ca25521c9926014942f3551b6e01d4185c4f287280c1
                                      • Opcode Fuzzy Hash: abb66450d73c1374ca4fb5c8958eb31f31a598fefbef32b933a31298f7ecb0d9
                                      • Instruction Fuzzy Hash: 5612D321B28A564BE7A8FB6C84A53F977D2FF99304F440579E04ED32D6DE2CAC418781

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 434 7ffd346d7ac6-7ffd346d7ad3 435 7ffd346d7ad5-7ffd346d7add 434->435 436 7ffd346d7ade-7ffd346d7ba7 434->436 435->436 440 7ffd346d7ba9-7ffd346d7bb2 436->440 441 7ffd346d7c13 436->441 440->441 442 7ffd346d7bb4-7ffd346d7bc0 440->442 443 7ffd346d7c15-7ffd346d7c3a 441->443 444 7ffd346d7bf9-7ffd346d7c11 442->444 445 7ffd346d7bc2-7ffd346d7bd4 442->445 449 7ffd346d7c3c-7ffd346d7c45 443->449 450 7ffd346d7ca6 443->450 444->443 446 7ffd346d7bd6 445->446 447 7ffd346d7bd8-7ffd346d7beb 445->447 446->447 447->447 451 7ffd346d7bed-7ffd346d7bf5 447->451 449->450 452 7ffd346d7c47-7ffd346d7c53 449->452 453 7ffd346d7ca8-7ffd346d7d50 450->453 451->444 454 7ffd346d7c8c-7ffd346d7ca4 452->454 455 7ffd346d7c55-7ffd346d7c67 452->455 464 7ffd346d7d52-7ffd346d7d5c 453->464 465 7ffd346d7dbe 453->465 454->453 456 7ffd346d7c69 455->456 457 7ffd346d7c6b-7ffd346d7c7e 455->457 456->457 457->457 459 7ffd346d7c80-7ffd346d7c88 457->459 459->454 464->465 466 7ffd346d7d5e-7ffd346d7d6b 464->466 467 7ffd346d7dc0-7ffd346d7de9 465->467 468 7ffd346d7da4-7ffd346d7dbc 466->468 469 7ffd346d7d6d-7ffd346d7d7f 466->469 474 7ffd346d7deb-7ffd346d7df6 467->474 475 7ffd346d7e53 467->475 468->467 470 7ffd346d7d81 469->470 471 7ffd346d7d83-7ffd346d7d96 469->471 470->471 471->471 473 7ffd346d7d98-7ffd346d7da0 471->473 473->468 474->475 477 7ffd346d7df8-7ffd346d7e06 474->477 476 7ffd346d7e55-7ffd346d7ee6 475->476 485 7ffd346d7eec-7ffd346d7efb 476->485 478 7ffd346d7e08-7ffd346d7e1a 477->478 479 7ffd346d7e3f-7ffd346d7e51 477->479 481 7ffd346d7e1c 478->481 482 7ffd346d7e1e-7ffd346d7e31 478->482 479->476 481->482 482->482 483 7ffd346d7e33-7ffd346d7e3b 482->483 483->479 486 7ffd346d7f03-7ffd346d7f68 call 7ffd346d7f84 485->486 487 7ffd346d7efd 485->487 494 7ffd346d7f6a 486->494 495 7ffd346d7f6f-7ffd346d7f83 486->495 487->486 494->495
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4607616738.00007FFD346D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd346d0000_HdTSntLSMB.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: eade2645b0d7feac282677bcde8683313a3a2b3d1f272c4e540ef9666f13da29
                                      • Instruction ID: 3c26aab1dccc7d89e5dc68aa11ad15133c73b7a9bbfb8ef5f8dfb026d26020b9
                                      • Opcode Fuzzy Hash: eade2645b0d7feac282677bcde8683313a3a2b3d1f272c4e540ef9666f13da29
                                      • Instruction Fuzzy Hash: E2F1B730609A8D8FEBA8DF28C8557F977E1FF55311F14426EE84DC7291CB38A9458B82

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 496 7ffd346d8872-7ffd346d887f 497 7ffd346d888a-7ffd346d889b 496->497 498 7ffd346d8881-7ffd346d8889 496->498 499 7ffd346d88a6-7ffd346d8957 497->499 500 7ffd346d889d-7ffd346d88a5 497->500 498->497 503 7ffd346d8959-7ffd346d8962 499->503 504 7ffd346d89c3 499->504 500->499 503->504 506 7ffd346d8964-7ffd346d8970 503->506 505 7ffd346d89c5-7ffd346d89ea 504->505 513 7ffd346d89ec-7ffd346d89f5 505->513 514 7ffd346d8a56 505->514 507 7ffd346d89a9-7ffd346d89c1 506->507 508 7ffd346d8972-7ffd346d8984 506->508 507->505 510 7ffd346d8986 508->510 511 7ffd346d8988-7ffd346d899b 508->511 510->511 511->511 512 7ffd346d899d-7ffd346d89a5 511->512 512->507 513->514 515 7ffd346d89f7-7ffd346d8a03 513->515 516 7ffd346d8a58-7ffd346d8a7d 514->516 517 7ffd346d8a3c-7ffd346d8a54 515->517 518 7ffd346d8a05-7ffd346d8a17 515->518 522 7ffd346d8aeb 516->522 523 7ffd346d8a7f-7ffd346d8a89 516->523 517->516 520 7ffd346d8a19 518->520 521 7ffd346d8a1b-7ffd346d8a2e 518->521 520->521 521->521 524 7ffd346d8a30-7ffd346d8a38 521->524 526 7ffd346d8aed-7ffd346d8b1b 522->526 523->522 525 7ffd346d8a8b-7ffd346d8a98 523->525 524->517 527 7ffd346d8a9a-7ffd346d8aac 525->527 528 7ffd346d8ad1-7ffd346d8ae9 525->528 533 7ffd346d8b8b 526->533 534 7ffd346d8b1d-7ffd346d8b28 526->534 529 7ffd346d8aae 527->529 530 7ffd346d8ab0-7ffd346d8ac3 527->530 528->526 529->530 530->530 532 7ffd346d8ac5-7ffd346d8acd 530->532 532->528 535 7ffd346d8b8d-7ffd346d8c65 533->535 534->533 536 7ffd346d8b2a-7ffd346d8b38 534->536 546 7ffd346d8c6b-7ffd346d8c7a 535->546 537 7ffd346d8b3a-7ffd346d8b4c 536->537 538 7ffd346d8b71-7ffd346d8b89 536->538 540 7ffd346d8b4e 537->540 541 7ffd346d8b50-7ffd346d8b63 537->541 538->535 540->541 541->541 542 7ffd346d8b65-7ffd346d8b6d 541->542 542->538 547 7ffd346d8c7c 546->547 548 7ffd346d8c82-7ffd346d8ce4 call 7ffd346d8d00 546->548 547->548 555 7ffd346d8ceb-7ffd346d8cff 548->555 556 7ffd346d8ce6 548->556 556->555
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4607616738.00007FFD346D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd346d0000_HdTSntLSMB.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5a0d44a0eca822523aea18af7fc12c6bf66b615398f35c778f662537c6f83fa7
                                      • Instruction ID: 4fa7ee3ea0046fba34a6f3e8902520d823df308e29d3afb29e22eed203c9dfac
                                      • Opcode Fuzzy Hash: 5a0d44a0eca822523aea18af7fc12c6bf66b615398f35c778f662537c6f83fa7
                                      • Instruction Fuzzy Hash: 9EE1B630A09A4E8FEBA8DF28C8597F977E1FF55310F14426AD85DC7291CF78A8458B81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4607616738.00007FFD346D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd346d0000_HdTSntLSMB.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d48d1e9ffdbaa994cc9485deaca4be050b68d5427b8b0d486873e2b4c205a4df
                                      • Instruction ID: 7d4e6e354d01eda9c97aabe80c6cf58a9a23f05909061daee48c1e28cd706909
                                      • Opcode Fuzzy Hash: d48d1e9ffdbaa994cc9485deaca4be050b68d5427b8b0d486873e2b4c205a4df
                                      • Instruction Fuzzy Hash: 1551DC50B0E6C90FE796ABB898B52B57FD5DF8B219B0805FBE0C9C71A3DD585806C342

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 135 7ffd346d26dd-7ffd346d27c0 RtlSetProcessIsCritical 139 7ffd346d27c8-7ffd346d27fd 135->139 140 7ffd346d27c2 135->140 140->139
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4607616738.00007FFD346D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd346d0000_HdTSntLSMB.jbxd
                                      Similarity
                                      • API ID: CriticalProcess
                                      • String ID:
                                      • API String ID: 2695349919-0
                                      • Opcode ID: f4f3dbc6ed7886e9cb2e64fc8a128cb8cf5be178f0980ac2aff665888732e460
                                      • Instruction ID: 121deff72be6dc94b840da675cdc340bc8711742d8a21b8c85622ae088bf1402
                                      • Opcode Fuzzy Hash: f4f3dbc6ed7886e9cb2e64fc8a128cb8cf5be178f0980ac2aff665888732e460
                                      • Instruction Fuzzy Hash: 0B41163190C6588FCB29DF98C855BE9BBF0FF56310F04416EE08AD3692CB746846CB91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 142 7ffd346d2c08-7ffd346d2c0f 143 7ffd346d2c1a-7ffd346d2c8d 142->143 144 7ffd346d2c11-7ffd346d2c19 142->144 148 7ffd346d2d19-7ffd346d2d1d 143->148 149 7ffd346d2c93-7ffd346d2ca0 143->149 144->143 150 7ffd346d2ca2-7ffd346d2cdf SetWindowsHookExW 148->150 149->150 151 7ffd346d2ce7-7ffd346d2d18 150->151 152 7ffd346d2ce1 150->152 152->151
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4607616738.00007FFD346D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd346d0000_HdTSntLSMB.jbxd
                                      Similarity
                                      • API ID: HookWindows
                                      • String ID:
                                      • API String ID: 2559412058-0
                                      • Opcode ID: 64ef69667b24c4ade9160aafb8e43e7e2704d7f7e36d26943bc4ff8f9f202ce5
                                      • Instruction ID: 71ccf8601f79da2a4fb33c0f036b14226caa49b43d6eb6e7f6b8e627f95f5f84
                                      • Opcode Fuzzy Hash: 64ef69667b24c4ade9160aafb8e43e7e2704d7f7e36d26943bc4ff8f9f202ce5
                                      • Instruction Fuzzy Hash: 10410830A1CA5D5FDB58DF6C98566F9BBE1EF5A321F00027ED049D3292CE64A852C7C1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4607616738.00007FFD346D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd346d0000_HdTSntLSMB.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 27082f136d3ec9498fae99d157e55b70ffbc665ac93e59b984b6b840b09b2363
                                      • Instruction ID: 9f3e69df54bca4283638720a57b9d7535a9ae70c58bb21f40128ac25c3b2bca8
                                      • Opcode Fuzzy Hash: 27082f136d3ec9498fae99d157e55b70ffbc665ac93e59b984b6b840b09b2363
                                      • Instruction Fuzzy Hash: 1AA17D57F0F6E31BF6626A6C6CF50EAAB90DF93265B0900B3D2D9C60939C0D7C079691
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2231544571.00007FFD346E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd346e0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f3b832b04e61dbf279d790cd083e5305d2b5e61dc5c803cfc524f59ccc41280d
                                      • Instruction ID: fa0d2ccaa199696b4103c75b82257d95038ed273122d6b7751fde03c5637d43c
                                      • Opcode Fuzzy Hash: f3b832b04e61dbf279d790cd083e5305d2b5e61dc5c803cfc524f59ccc41280d
                                      • Instruction Fuzzy Hash: C151ED50B0D6C90FE796ABB888B52B6BFD5DF8B219B0805FBE0C9C7193DD185846D342
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2231544571.00007FFD346E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd346e0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ec6352e23b7f11b89d4af8f6f351759161e82b520a68615d9dc5cfe7c8dc13a9
                                      • Instruction ID: 7d1444a681e473d813f002bd1d4ec718e46968566cea95b3d015d2d6f16366fe
                                      • Opcode Fuzzy Hash: ec6352e23b7f11b89d4af8f6f351759161e82b520a68615d9dc5cfe7c8dc13a9
                                      • Instruction Fuzzy Hash: 1081E821B0DA9A0FE756AB7C88B51FA7BE1EF87214B4900BBD08DC7193DD1C6846C351
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2231544571.00007FFD346E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd346e0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2c3ffe8a38f9f9f1a3f6a3951ae7c4134592265f58fa38d63dbd73a59e3f4774
                                      • Instruction ID: ad694ece9459b16c76883ccac570f9a645b6175fbd479ca0cff2c6484c6ef531
                                      • Opcode Fuzzy Hash: 2c3ffe8a38f9f9f1a3f6a3951ae7c4134592265f58fa38d63dbd73a59e3f4774
                                      • Instruction Fuzzy Hash: 65518861B18A195FDB64BB7894AE6EE7BE2FF45314F800879E50ED32C2DD2C6851C701
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2231544571.00007FFD346E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd346e0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7b9d34f8e5abe5d4f195f38bb5436c321365b87f83353c23e5c734394304eebd
                                      • Instruction ID: ac44d863a3465e0dabc8625f56fc3c876aaae26347cec4915b78f1443524322c
                                      • Opcode Fuzzy Hash: 7b9d34f8e5abe5d4f195f38bb5436c321365b87f83353c23e5c734394304eebd
                                      • Instruction Fuzzy Hash: 0831B521B1C9590FE798EB6C946A3B9B7C2EF9D355F0805BEE04EC3293DD68AC418340
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2231544571.00007FFD346E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd346e0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7ff030800f48a36bd4a01c8983c87718d82b3794fdc4cb741ecc69e612b437c0
                                      • Instruction ID: 8358e8b994d3cb7b732f9396104948ce2e1e59b8b929e039117af8cf9bb7e31b
                                      • Opcode Fuzzy Hash: 7ff030800f48a36bd4a01c8983c87718d82b3794fdc4cb741ecc69e612b437c0
                                      • Instruction Fuzzy Hash: BD31F821B1C9194FEB54BBAC98693FA77E5FF99315F080277E04CC3292DD2C68418751
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2231544571.00007FFD346E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd346e0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 10d023ed5acd2f4956329b2b54603b57000aa6ef2eea67b684c6db08214e17e1
                                      • Instruction ID: c5f72efd3c80aad775efaf482014938983697b8811d7453eb32b5a07630f2e64
                                      • Opcode Fuzzy Hash: 10d023ed5acd2f4956329b2b54603b57000aa6ef2eea67b684c6db08214e17e1
                                      • Instruction Fuzzy Hash: 07317F71B18A198FEB54EBACC4A96EEB7F1FF98300F940579D149D7282CE38A841C751
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2231544571.00007FFD346E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd346e0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: aec39021d65cdb305dc9d68d54a7a4a9f85571f7a3f5cf121f18e4a93eda27da
                                      • Instruction ID: c3d08dcb0b2d6219e86cb12f93dee71c2d59ed1f868d2ede756311cc1e327934
                                      • Opcode Fuzzy Hash: aec39021d65cdb305dc9d68d54a7a4a9f85571f7a3f5cf121f18e4a93eda27da
                                      • Instruction Fuzzy Hash: F531E421B4895A5BD761FBACD0AA4EA7FE1EF85318F90497DD14CC3387CD286841CB41
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2231544571.00007FFD346E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd346e0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f6e9f4eca328960688d2b87ceab37eedf91fcd623b3997dcabe7ac130dbfcf14
                                      • Instruction ID: 955d38dca51ddb5901abb5d6f80fb1f3f85fcb452879e67baf1ab09c0b462c11
                                      • Opcode Fuzzy Hash: f6e9f4eca328960688d2b87ceab37eedf91fcd623b3997dcabe7ac130dbfcf14
                                      • Instruction Fuzzy Hash: A701FC51A0DA920FE7916B3C55B54F2BFE0DFD6710B4C04BAE588C6196DC1C69C19391
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2342352678.00007FFD346F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ffd346f0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 199120f0ae82adcee9473fdbcafa3bc91d56791008f40e7fdf28dea11b5f57ca
                                      • Instruction ID: 2c90d827612f99c3d4cb051eace448a627cae6449dbbc12287a9facbe2cfae2b
                                      • Opcode Fuzzy Hash: 199120f0ae82adcee9473fdbcafa3bc91d56791008f40e7fdf28dea11b5f57ca
                                      • Instruction Fuzzy Hash: 4251DC51B0E6C90FE796AB7888B52B5BFE5DF9B259B0801FBE0C9C7193DD185806C302
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2342352678.00007FFD346F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ffd346f0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 16f2435953e0f9e6f0f9e48d5f5aa27793f049c972aeae8029c2ede18f66959f
                                      • Instruction ID: d6645054170a8de72c39fb45d6a46de7e03b395bc81e59d4a18745abba40ceb5
                                      • Opcode Fuzzy Hash: 16f2435953e0f9e6f0f9e48d5f5aa27793f049c972aeae8029c2ede18f66959f
                                      • Instruction Fuzzy Hash: 45811822B0DA9A0FE756AB6C88B61F97BE1EF87214B4901B7D08DC7193DD2C6C46C351
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2342352678.00007FFD346F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ffd346f0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cc044fc972bc2151a7b8c712db9bad00af05aff95dc45f388d7dd45ce9b20617
                                      • Instruction ID: bb8cfbac3f942b03c0a5bb1b690ed7090a179293e602b874b7de23f9b06b8752
                                      • Opcode Fuzzy Hash: cc044fc972bc2151a7b8c712db9bad00af05aff95dc45f388d7dd45ce9b20617
                                      • Instruction Fuzzy Hash: AA51C371B186194FDB65FB7898AA6ED7BA6FF95204F800579E44EC72C6DD2C9801C700
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2342352678.00007FFD346F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ffd346f0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d53f3994ba722d96bc9722aa33e3919ffbac2ff25106632a35806c3b3bfe610b
                                      • Instruction ID: af8c96488c3215cb48d2a3e3e5fcbd0b81c5c5f82204b46ce86b93cf14e971b8
                                      • Opcode Fuzzy Hash: d53f3994ba722d96bc9722aa33e3919ffbac2ff25106632a35806c3b3bfe610b
                                      • Instruction Fuzzy Hash: F531D721B1C9590FE798EB6C946A2B9B7C6EF9D355F0406BEE04EC32D3DD68AC018340
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2342352678.00007FFD346F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ffd346f0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7cd34645c72ff9174ae0de031feb49892e2bce3cfe575016c10fcfb4595a8f7a
                                      • Instruction ID: 8b735353a402769599086195fa7a8b99f09f8d8b0ed03749c0002daa169b0ebb
                                      • Opcode Fuzzy Hash: 7cd34645c72ff9174ae0de031feb49892e2bce3cfe575016c10fcfb4595a8f7a
                                      • Instruction Fuzzy Hash: 8B310822B18D194FEB65BBAC98693FD77E5EF99315F0402B7E44CC3292DD2C68018352
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2342352678.00007FFD346F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ffd346f0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 217a63dfdd73e3473cea8f8986fcd6e469badfa9e1766ea1dd0dc5fdd7df2b86
                                      • Instruction ID: 80adfbbf4b17edef2c807eee7f6ff8c43eb9d5948d8ac4967c0a0b6946932f25
                                      • Opcode Fuzzy Hash: 217a63dfdd73e3473cea8f8986fcd6e469badfa9e1766ea1dd0dc5fdd7df2b86
                                      • Instruction Fuzzy Hash: 52319F71B18A1A8FEB55EBACC8A56ED77A1FF98300F900679D04DD7286CE38A801C740
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2342352678.00007FFD346F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ffd346f0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2e7b4729692e32a959b1eead031de2c78655570c0d083713ded48092c73c0d58
                                      • Instruction ID: 3f20ec7ba6499084bc2b096411cea90dd1cacea10e91055517344109d04e2d76
                                      • Opcode Fuzzy Hash: 2e7b4729692e32a959b1eead031de2c78655570c0d083713ded48092c73c0d58
                                      • Instruction Fuzzy Hash: 1131C165B4854A4FD762FBACD4E21E93FA5FFD5214B904A64D48CCB3DACD286901C780
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2342352678.00007FFD346F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ffd346f0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 66402c910a4c1c8d0c2ee20f0726da881be147fa60ccdb7000cba24290ed5b18
                                      • Instruction ID: 72ce5e9e8b3d70140267435a4744d52c031eccf9b77ac477797689c559b46eef
                                      • Opcode Fuzzy Hash: 66402c910a4c1c8d0c2ee20f0726da881be147fa60ccdb7000cba24290ed5b18
                                      • Instruction Fuzzy Hash: 77014716A0D6960FE7926B3C18B54F13FE0EF92250B0805BAE5C8C61D7DC0CA9418382
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.2423662597.00007FFD346E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_7ffd346e0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: aed8d507f0b0f71cdda6b92e7a23b4981aa5d614087c17cc188703d3671cbd9b
                                      • Instruction ID: 324764d3f4cd50737a857fde5b526745fafbfe51f4157a44923b61a8cc796148
                                      • Opcode Fuzzy Hash: aed8d507f0b0f71cdda6b92e7a23b4981aa5d614087c17cc188703d3671cbd9b
                                      • Instruction Fuzzy Hash: F451ED50B0D6C90FE796ABB888B52B6BFD5DF8B219B0805FBE0C9C7193DD185846D342
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.2423662597.00007FFD346E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_7ffd346e0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1ac623c6facefa8c19626ce40b890cde082106f9deae94fd5c3c8053945ab2b7
                                      • Instruction ID: d7c4df6192567a2575db6491fe95af1b2abf52f4e0961d430ec10f8ec7db5aa6
                                      • Opcode Fuzzy Hash: 1ac623c6facefa8c19626ce40b890cde082106f9deae94fd5c3c8053945ab2b7
                                      • Instruction Fuzzy Hash: 2B81E821B0DA960FE756AB7C88B51FA7BE1EF87214B4900BBD08DC7193DD1C6846C351
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.2423662597.00007FFD346E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_7ffd346e0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: acfe2cbc5ceac3826a16b077fc3cf56263aeb3afda4f00bc51560293c4b26334
                                      • Instruction ID: a398a9035e2f2831e3790e47d99107246346ec6ccb86b32d01e1385c98ad5038
                                      • Opcode Fuzzy Hash: acfe2cbc5ceac3826a16b077fc3cf56263aeb3afda4f00bc51560293c4b26334
                                      • Instruction Fuzzy Hash: 1A515561B18A194FDB65BB78D4AE6EA7BE2FF45214FC00879E40ED3282DD2C6851C701
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.2423662597.00007FFD346E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_7ffd346e0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 17752efc2285c6d0fba674329badad44ba40c0bbbd43852705d1bc11481383e6
                                      • Instruction ID: 47ad325e5989a776b5cce3f9e4ede8e7bbf8bf420b0e5173d808e4adf917de6d
                                      • Opcode Fuzzy Hash: 17752efc2285c6d0fba674329badad44ba40c0bbbd43852705d1bc11481383e6
                                      • Instruction Fuzzy Hash: E031B521B1C9590FE798EB6C946A3B9B7C2EF9D355F0805BEE04EC3293DD68AC418340
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.2423662597.00007FFD346E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_7ffd346e0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7ff030800f48a36bd4a01c8983c87718d82b3794fdc4cb741ecc69e612b437c0
                                      • Instruction ID: 8358e8b994d3cb7b732f9396104948ce2e1e59b8b929e039117af8cf9bb7e31b
                                      • Opcode Fuzzy Hash: 7ff030800f48a36bd4a01c8983c87718d82b3794fdc4cb741ecc69e612b437c0
                                      • Instruction Fuzzy Hash: BD31F821B1C9194FEB54BBAC98693FA77E5FF99315F080277E04CC3292DD2C68418751
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.2423662597.00007FFD346E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_7ffd346e0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e2a2fc3b8908e6083c49f52ea8e63e08fc12562a3877b4e576247a0e655b8275
                                      • Instruction ID: cb962f8ee705aaee6b62a1e9419b267727a8474ab45ef59c0912e9c3459386a5
                                      • Opcode Fuzzy Hash: e2a2fc3b8908e6083c49f52ea8e63e08fc12562a3877b4e576247a0e655b8275
                                      • Instruction Fuzzy Hash: 92318C31B18A5A8FEB95EBACC4A57EA77F1FF98300F940579D049D3282CE78A841C741
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.2423662597.00007FFD346E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_7ffd346e0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d6c1056f5bbe97b6201374501623e19710b4a06d6448ad7754a4fae495601ba2
                                      • Instruction ID: def778bf1a271765f01121310c5f2f6cdc95a21a64c0aa4fda58076c90e14543
                                      • Opcode Fuzzy Hash: d6c1056f5bbe97b6201374501623e19710b4a06d6448ad7754a4fae495601ba2
                                      • Instruction Fuzzy Hash: 2E31C531B4899A4BDBA2FBACD0A61EA3FF1EF85214FD44979D04CC3386CD686941C740
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.2423662597.00007FFD346E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_7ffd346e0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9da4832c3a6c2f5625a6444a2539156f91df2ec53f531a6e833c5f35160c06dc
                                      • Instruction ID: a977e94a13b954f83386867c41e15a502315cbd3d7fec2ca6e606f4f431e3d32
                                      • Opcode Fuzzy Hash: 9da4832c3a6c2f5625a6444a2539156f91df2ec53f531a6e833c5f35160c06dc
                                      • Instruction Fuzzy Hash: 01014711A0CAA20FE792AB3C58B54F2BFE0DFD2710B4C04BAE588C6192DC0C69C19392
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2776988202.00007FFD346E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ffd346e0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 494ccd5e0ec2b339748d1ec85d1d95d1e938efd42be640009b41a253b38f747c
                                      • Instruction ID: a24ec7d8f6bacdad0c3d2d28e15b362cadd54982de9370113515fb369c3d14dc
                                      • Opcode Fuzzy Hash: 494ccd5e0ec2b339748d1ec85d1d95d1e938efd42be640009b41a253b38f747c
                                      • Instruction Fuzzy Hash: EF51ED50B0D6C90FE796ABB888B52B6BFD5DF8B219B0805FBE0C9C7193DD185846D342
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2776988202.00007FFD346E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ffd346e0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9ea9bdc6f8fcc068c1846f65a3b81a1c4beb24a13477c35664ce6f9ce50c69d5
                                      • Instruction ID: 39e1090aa5122ea3180ad7e922f9b6e19b9e37a8a19b00feef9b6f459e9ec56b
                                      • Opcode Fuzzy Hash: 9ea9bdc6f8fcc068c1846f65a3b81a1c4beb24a13477c35664ce6f9ce50c69d5
                                      • Instruction Fuzzy Hash: 7581E821B0DA9A0FE756AB7C88B51FA7BE1EF87214B4900BBD08DC7193DD1C6846D351
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2776988202.00007FFD346E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ffd346e0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 47d4bb89b37285c00ad3231bcd73bb62a4a7d3592eb5fe9a2a8437c7a45ec55e
                                      • Instruction ID: 0e0e570841452696a0c5d85d2ac919907b3fbe5de8a26e3dda0ece2f3ada097b
                                      • Opcode Fuzzy Hash: 47d4bb89b37285c00ad3231bcd73bb62a4a7d3592eb5fe9a2a8437c7a45ec55e
                                      • Instruction Fuzzy Hash: 52519561B186194FDB65BBB894AE6EE7BE2FF89304F800879E50ED3283DD2C5911C700
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2776988202.00007FFD346E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ffd346e0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 974b73c0c68039e96bd72bebd283d533e6ddf6ebcccba03ebd8be46bcda58eb2
                                      • Instruction ID: 1784cfe27df504692143c9bdd64066cb9741482f75fd844c034c4a8c499364b6
                                      • Opcode Fuzzy Hash: 974b73c0c68039e96bd72bebd283d533e6ddf6ebcccba03ebd8be46bcda58eb2
                                      • Instruction Fuzzy Hash: C431B561B1C9590FE798EB6C946A3B9B7C2EF9D355F0805BEE04EC3293DD68AC418340
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2776988202.00007FFD346E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ffd346e0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7ff030800f48a36bd4a01c8983c87718d82b3794fdc4cb741ecc69e612b437c0
                                      • Instruction ID: 8358e8b994d3cb7b732f9396104948ce2e1e59b8b929e039117af8cf9bb7e31b
                                      • Opcode Fuzzy Hash: 7ff030800f48a36bd4a01c8983c87718d82b3794fdc4cb741ecc69e612b437c0
                                      • Instruction Fuzzy Hash: BD31F821B1C9194FEB54BBAC98693FA77E5FF99315F080277E04CC3292DD2C68418751
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2776988202.00007FFD346E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ffd346e0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e9be444df1a8ab78ee583535e16590d67fdace4d71360d5c4953bc9d83bdfecb
                                      • Instruction ID: f554c9432164d8c2e8e1f3b2d006d94170cc540b30b49e6f3bb5b23666554066
                                      • Opcode Fuzzy Hash: e9be444df1a8ab78ee583535e16590d67fdace4d71360d5c4953bc9d83bdfecb
                                      • Instruction Fuzzy Hash: 8C31A031B18A198FEB54EBACC4A56EEB7F2FF98301F940579D149D3282CE38A841C750
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2776988202.00007FFD346E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ffd346e0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 55801197f52c04fcf377a0f03536ae9579872f381d499aa8d7509e3c66efefc9
                                      • Instruction ID: 5dcf2104984094fb6c2ae364fca0d468668e88e95d72bd64bd15af4f11804bdb
                                      • Opcode Fuzzy Hash: 55801197f52c04fcf377a0f03536ae9579872f381d499aa8d7509e3c66efefc9
                                      • Instruction Fuzzy Hash: 0931E161B4895A4FD761FBACD0A64EA7BA2EFC9319F804979D14CC3387CD286941CB80
                                      Memory Dump Source
                                      • Source File: 00000010.00000002.2776988202.00007FFD346E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD346E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_16_2_7ffd346e0000_XClient.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5ec047d72eccb90543056fa8969f0f3800e6da9b577b79547a8933cfbfec5392
                                      • Instruction ID: f7e414708582540b29152614836901116ce1f20bb5db6d1087be5595fbb3d653
                                      • Opcode Fuzzy Hash: 5ec047d72eccb90543056fa8969f0f3800e6da9b577b79547a8933cfbfec5392
                                      • Instruction Fuzzy Hash: 2E01F751A0D6A20FE792AB3C59B54F2BFE0DFD6710B4C04BAE588C6197DC1CA981D392